Packard Bell EN TM80: Reference Topics (Elements, Descriptions)
Reference Topics (Elements, Descriptions): Packard Bell EN TM80
Reference Topics (Elements, Descriptions)
A
About Secure Perfect
Help Menu
Selection of this option opens a screen displaying the Secure Perfect software version, service pack
number, copyright information, licensing information, and contact information.
A sample window for a Secure Perfect system might display as follows:
Access Right
Personnel Menu
The Access Right option displays the Access Right Form that allows you to assign when (using a time
schedule or allowing access at all times) and where (using readers) access is given, that is then assigned
to a person.
Secure Perfect 6.1.1 User Manual 87
Access Rights Assignment
Select from the Available list those access rights you want to assign to this person. The access rights
that display in this list are those that were previously set up on the Access Rights Form. Only access
rights in the operators’ facilities are available for assignment by this operator.
• Select, then click the right arrow to assign an available access right.
• Select, then click the left arrow to unassign an access right.
Access Rights Tab
Access Right Form
Use this tab to create and define access right records.
• Assigned readers: This windowpane lists all readers currently assigned to this access right.
• Assign Readers: Click to display the Reader Assignment dialog box and select from a list of
readers available for assignment by this operator. If no readers are listed, check that the
readers have been marked Active on the Readers tab of the Reader Form.
Access control:
• Allow access at all times: Select this option to allow access all the time, in all modes.
• Allow access by schedule: Select this option to assign a time schedule to this access right.
The time schedule governs when the access right grants access to the assigned readers.
• Time schedule: If you selected Allow access by schedule, this field is now available to select
a time schedule from the drop-down list of previously created time schedules.
If you do not have valid access to a reader that belongs to an Intrusion Zone due to a schedule in that
access right, you will not be able to arm/disarm a zone.
Access Rights Tab
Person Form
Use this tab to assign access rights to this person.
Assigned access rights
This windowpane lists any currently assigned access rights.
Assign
Click to display the Access Rights Assignment dialog box, enabling you to select the access rights you
want to assign or unassign for this badgeholder.
Activity Monitor
Operations Menu
The Activity Monitor option opens the Activity Monitor Form that allows you to monitor badge and
intrusion zone transactions. The shortcut key combination for Activity Monitor Form is CTRL+A.
Clicking this icon from the Secure Perfect toolbar can also access this option:
Secure Perfect 6.1.1 User Manual 88
Activity Monitor Form Shortcut Menu
Options of the shortcut menu are as follows:
Resume: Starts the scrolling of badge transactions. This option will be active only if you previously
selected Pause. All badge transactions that occurred while the Pause option was on will be displayed
once you select Resume.
Pause: Suspends scrolling of badge transactions on the Activity Monitor.
Clear: Clears all badge transactions from the Activity Monitor.
Swipe and Show Readers: Select to display an Edit Readers List assignment form. Select those
readers you want monitored in the Swipe and Show window. If readers have not been selected, the
Swipe and Show program will not start.
Launch Swipe and Show: Starts the Swipe and Show program. Only one instance of Swipe and Show
is available for display on a computer at one time. If Imaging is not licensed for the system, this option is
not available.
Badge: Displays the Badge Form, making available the selected badge record.
View Live Video: Accesses live video from the camera(s) associated with the reader’s badge transaction
as defined by its event trigger. In order to view live video, the DVR must be online (if it is a duplex
recorder, the recorder must also be in record mode). The following windows open:
• The Digital Video Viewer. (Refer to Digital Video Viewer Help for information about the Digital
Video Viewer.)
• Video window(s) displaying the current live view of the camera(s) associated with the badge
transaction. Each window displays a dialog box containing the current date and time.
View Recorded Video: Accesses previously recorded video from the camera(s) associated with the
reader’s badge transaction as defined by its event trigger. In order to view recorded video, the DVR must
be online and available. The DVR cannot be serving another request for playback of any recorded video
event. The following windows open:
• The Digital Video Viewer. (Refer to Digital Video Viewer Help for information about the Digital
Video Viewer.)
• Video window(s) displaying the recorded video associated with the badge transaction. Each
window displays a dialog box containing the current date and time.
View Single Recorded Frame: Select to display the first frame of the event recording as a still photo.
Quick Launch: Accesses live and recorded video from camera(s) associated with the reader’s badge
transaction as defined by its event trigger.
A message dialog will display if video is not available because associated cameras are not assigned
to the current active facility.
Secure Perfect 6.1.1 User Manual 89
Activity Monitor Form Toolbar
Reference Topic:
Activity Monitor Form Shortcut Menu
The Activity Monitor Form toolbar consists of the following options:
Click To
Resume or restart the scrolling of badge transactions.
Pause or suspend the scrolling of badge transactions.
Clear all badge transactions.
Display an Edit Readers List dialog.
Start the Swipe and Show program. This option will not
be available if the system is not licensed for Imaging or
readers have not been selected.
Add Map
An Add Map dialog box displays when you click Add Record on the Secure Perfect toolbar while the
Alarm Graphics Editor window is displayed, allowing you to navigate to a file source for an existing map.
Description
Enter a description of the type of map. Example: Overview of Main Building.
Facility
A facility option can be assigned from the drop-down list of available facilities for assignment by this
operator.
File
Enter the full pathname of the file or click Browse to navigate, locate, and select the file. Secure Perfect
supports map files in the Windows MetaFile format (.wmf or .emf).
Add New Icon to Database
Alarm Graphics Viewer Form
Click to import your own icon files to the list of available icons used in the previous three fields to
represent a specific alarm state. Icon files must be .ico format.
Secure Perfect 6.1.1 User Manual 90
Adding Sound to an Alarm
If you would like to hear a sound from the Secure Perfect computer when an alarm occurs, follow the
steps below:
You MUST have a sound card in your computer!
1. Click Start, Settings, then Control Panel.
2. From the Control Panel window, double-click the Sounds and Multimedia icon.
3. In Sound Events, scroll to Secure Perfect.
4. Select the alarm to which you want to assign sound; then select the sound you want for that alarm.
5. Click OK to save the change and exit the window or Apply to save that change and add more sounds.
6. Start SP; select Administration, then Parameters.
7. On the Settings tab of the Parameters Form, verify that the Console alarm sound field is set for the
results you anticipate (either Continuous or Short).
Additional Filters Tab
Person Report
This tab displays ONLY if you have selected User Data in the field Report Type on the General Tab of the
Person Report. Use this tab to add user fields as an additional filter for the report.
• User Fields: This window lists all the user fields, the user field value you want to use as a
filter, and whether the user field should print. (You can print the user field on the report by
selecting the field Print selected user field or deselect this field so the user field will not print.)
• Modify Value: To change the value of a user field, select the user field you want and enter a
new value in this field.
• User fields printed on report: If this field is enabled, then the currently selected user field will
print on the report.
• Clear All/Set All: Click Clear All so that none of the User Fields are set to print. Click Set All
to set all of the User Fields to print.
• Print selected user field: Enable this field to set the selected User Field to print or disable this
field so that the selected User Field does not print.
Additional Filters Tab - Badge History Report Form
Use this tab to select additional, specific criteria by which this report will be generated.
• Micro: Select the micro you want to use to generate report information. If you want to use all
micros, select <ALL>.
• Reader: Select the reader you want to use to generate report information. If you want to use
all readers, select <ALL>.
• Department: Select the department you want to use to generate report information. If you
want to use all departments, select <ALL>.
• Activity: Select the badge activity you want to use to filter report information, such as Duress
Invalid, Duress Valid, Duress Valid No Passage, Duress Valid Open, Guard Tour Activity,
Invalid, Invalid APB In, Invalid APB Out, Invalid Floor, Invalid PIN, Invalid T&A In, Invalid T&A
Out, Invalid Timed APB, Lost, Max Invalid PIN, Overdue, Override, Unknown, Valid, Valid No
Passage, and Valid Open. If you want to use all activities, select <ALL>.
• Logical Reader Type: Select the logical reader type that you want to use to limit the report,
such as APB In, APB In or Out, APB Out, Elevator, In Required, Normal, T&A In, T&A In and
Out, T&A In or Out, or T&A Out. If you want to use all the logical reader types, select <ALL>.
• Floor Description: Select the range of floor descriptions you want to display on the report. If
you want to list all floor descriptions, leave these fields blank.
Secure Perfect 6.1.1 User Manual 91
Additional Filters Tab - Zone History Report
Use this tab to select additional, specific source criteria by which this report will be generated.
• Activity Type: Select the type of activity to use in generating this report. If you want to use all
intrusions zone activity type messages, select <ALL>.
• Locaton : Select the source of the zone activity as a Badge, Digital Input, Manual, Micro, or
<ALL>.
• Device Description: Enter the range of device descriptions on which you want to report.
Leave blank for all descriptions.
• Micro Description: Enter the range of micro descriptions you want to use to generate report
information. If you want to use all micros, select <ALL>.
Address Fields Tab
Parameters Form
Use this tab to modify the labels of the address fields. These labels are used on the Person Form.
Address 1/Address 2/Address 3/Address 4/Address 5
Displays the current label. To edit or create a new label, select and enter text over the existing text. The
address field label can be up to 32 alphanumeric characters in length.
Click Save before you exit this form.
Administration
Reports Menu
The Administration option opens the Administration Report Form that allows you to create a report on
the administrative aspects of your Secure Perfect system, such as alarm instructions, events, host
parameters, operators, permissions, responses, schedules, archives, client, and floors.
Secure Perfect 6.1.1 User Manual 92
Administration Menu Selections
The following selections display in the Administration drop-down menu:
Operator
Permission
Client
Region
API Connections
Event Schedule
Time Schedule
Mode Schedule
Instruction
Response
Alarm Notifier
Client Group
Alarm Routing and Bumping
Floor
Parameters
Override
Badge Format
Auto Update
LogFile
Diagnostic Setting
Diagnostic Viewer
CCTV Alarm
Camera Preset
Event Trigger
Intrusion Zone
Guard Tour
Tour Point
Facility
Secure Perfect 6.1.1 User Manual 93
Alarm
Device Menu
The Alarm option displays the Alarm Form that allows you to modify records that are automatically
generated when you define a micro. It also displays alarms created from Digital Inputs.
Alarm Assignment
This window displays a list of alarms in the Secure Perfect system for the facilities available for
assignment by this operator. All alarms display. If this is a Global Edition system, alarms are not filtered
by Region.
• Select, then click the right arrow to assign an available alarm.
• Select, then click the left arrow to unassign an alarm.
Click OK to display results in the Assigned Alarms windowpane.
Alarm Bumping Client Group Assignment Dialog Box
This dialog box allows you to select and assign Client Groups for this bumping record. Only Client
Groups in the operator’s facilities are available for assignment by this operator.
• Select, and then click the right arrow to assign an available Client Group.
• Select, and then click the left arrow to unassign a Client Group.
Click OK to close this dialog box and display the results in the Bumping, Client Groups windowpane.
Alarm/Digital Input Tab
Manual Control
Manually monitor alarms and DIs (digital Input points) depending on the current operator’s facilities and
permissions.
There may be schedules in effect that will override manually controlled changes if schedule override
is selected; otherwise, the manual control selection is truly indefinitely.
Select type
Select one of the alarm/DI types from the drop-down list:
• Alarms
• Alarm Groups
• Digital Input
Nothing will display in the list box until you choose a micro option.
Select micro
Select a micro option.
• All displays all the selected type of devices in the current operator’s facilities for all micros.
• By Micro displays all the selected type of devices in the current operator’s facilities for a specific micro.
Columns in Windowpane
• Description: Description of the Alarm/DI in the database.
• Micro: Micro on which the Alarm/DI is located.
Secure Perfect 6.1.1 User Manual 94
Set state to:
The names of the buttons change depending on the DI type (Alarm or Other) selected.
If an Alarm or Alarm Group is selected, click . . .
• Monitor On: To monitor the selected alarms or alarm groups. Setting Monitor On will display the
alarms on the Alarm Monitor Form.
• Monitor Off: To immediately discontinue monitoring the selected alarms or alarm groups. Setting
Monitor Off will not display alarms on the Alarm Monitor Form.
• Indefinite: To make the change permanent. This selection does not allow it to be overridden by a
schedule (can be monitor ON or OFF).
• Sched. Override: To change the state of the monitoring by a schedule override. For example, use
Sched. Override to monitor an alarm until a schedule overrides it. If you don’t want the schedule to
stop the monitoring, click Indefinite.
If a DI is selected, click . . .
• Enable: To enable the selected DI on the micro so a state change will be reported.
• Disable: To immediately disable the selected DI on the micro so its state changes will not be reported
to the host or trip a Digital Output.
• Indefinite: To Enable or Disable permanently.
• Sched. Override: Use this option to change operation state of a DI if you want a schedule to override
its setting. For example, use Sched. Override to control operation of the DI until a schedule takes
over. If you don’t want a schedule to control activation of a DI, use the On Indefinite selection.
Purpose
Enter an explanation for monitoring an alarm or enabling/disabling DI points. This field accepts 255
alphanumeric characters. These comments are written to the operator history field and display on the
Operator History Report, Purpose Field.
Alarm Graphics Editor
Operations Menu
The Alarm Graphics Editor option opens the Alarm Graphics Editor that allows you to add icons on
graphical map views to point out the location and type of incoming alarms. You cannot create a map
using SP; create it using the program of your choice and save it in .WMF or .EMF format.
Alarm Graphics Viewer
Operations Menu
The Alarm Graphics Viewer option opens the Alarm Graphics Viewer that allows you to view the maps
of your facility that were created. These maps point out the location and type of incoming alarms. The
shortcut key combination for Alarm Graphics Viewer is CTRL+V.
Clicking this icon from the Secure Perfect toolbar can also access this option:
Secure Perfect 6.1.1 User Manual 95
Alarm Graphics Viewer Shortcut Menu
Operator permissions for the Alarm Graphics Viewer must be assigned to ‘Update’ in order to view
and select right-click menu options. Points, alarms, DIs, and DOs do not display if not in the operator’s
facility. For shortcut menu functionality, move your mouse pointer to an assigned point and click the right
mouse button. The shortcut menu that displays with a right-click mouse button depends on the Point
Type assigned.
Element Description
• Alarm Monitor Form
Displays the Alarm Monitor form. This is the right-click menu
option when mouse pointer is not on an assigned map point.
Alarm Point Right-Click
Menu Options:
• Alarm Monitor Form
Displays the Alarm Monitor form.
• Monitor On Indefinite
Activates the assigned alarm. The alarm will remain active
until you manually turn it off.
• Monitor Off Indefinite
Immediately deactivates the alarm.
• Monitor On Schedule Override
Immediately activates this alarm and the schedule overrides
any active setting.
• Monitor Off Schedule Override
Immediately deactivates this alarm and the schedule overrides
any active setting.
Digit Input Point Right-Click
Menu Options:
• Enable On Indefinite
Enables this DI and will remain enabled until you change the
state manually.
• Enable Off Indefinite
Disables this DI and this DI will remain Off until you change
the state manually.
• Enable On Schedule Override
Immediately activates this digital input and a schedule can
override any active setting for this digital input.
• Enable Off Schedule Override
Immediately deactivates the digital input and a schedule can
override any active setting for this digital input.
Digit Output Point Right-Click
Menu Options:
• Unlock Reader/On for Duration
Immediately unlocks the reader or turns on the DO and
remains unlocked for the specified ‘On Time.’
• Unlock Reader Indefinitely/On
Immediately unlocks the reader or turns on the DO associated
with this reader and remains unlocked indefinately.
• Lock Reader/Off
Immediately locks the reader or turns off the DO associated
with this reader.
• Unlock Reader Schedule Override
Immediately unlocks the reader or turns on the DO associated
with this reader and the schedule overrides any active setting.
Alarm Group
Device Menu
The Alarm Group option opens the Alarm Group Form that allows you to assign alarms into groups or
sets for scheduling purposes. Example: To apply a schedule to a series of alarms, apply the schedule to
a group that contains the specific alarms.
Secure Perfect 6.1.1 User Manual 96
Alarm History
Reports Menu
The Alarm History option opens the Alarm History Report Form that allows you to create a report based
on the history of alarm activity.
Alarm Instruction Assignment
This window displays when you click Edit, allowing you to modify the list of alarm instructions assigned to
this alarm. Only alarm instructions in the operators’ facilities are available for assignment by this operator.
Select, and then click the right arrow to assign an available instruction. A maximum of six alarm
instructions can be assigned.
Select, and then click the left arrow to unassign an instruction.
Click OK to display results in the Instruction windowpane of the Alarm Form.
Alarm Instruction Tab
Use this tab to create instructions on how to react to alarms. The instructions should belong to the same
facility as the alarm with which they will be associated.
• Number: Assign a number to the instruction records. The range for alarm instructions is 0 to
254 for a total of 255 instructions.
• Instructions: Enter the text you want to display when the associated alarm occurs. The
instruction can be 0 to 64 alphanumeric characters in length.
Alarm Monitor
Operations Menu
The Alarm Monitor option opens the Alarm Monitor Form that allows you to monitor alarm activity. The
shortcut key combination for Alarm Monitor Form is CTRL+M.
Clicking this icon from the Secure Perfect toolbar can also access this option:
Secure Perfect 6.1.1 User Manual 97
Alarm Monitor Form Shortcut Menu
Reference Topic:
Alarm Monitor Form Toolbar
Select To
Show Inactive
Display alarms in an inactive state and removed from view. These
Alarms
alarms were previously acknowledged or purged from the Alarm
Monitor. This is a toggle election and is a way to display previous
alarm activity without running a report.
Alarm
Opens the Alarm Form, allowing you to modify or view that
particular alarm record.
Alarm Graphics
Opens the Alarm Graphics Viewer Form, allowing you to view the
Viewer
alarm graphics map to which the alarm belongs.
Alarm Graphics
Opens the Alarm Graphics Editor Form, allowing you to create or
Editor
edit a graphical view of alarm states for the alarms you select.
View Live Video
(If a camera icon is not displayed to the left of the alarm description,
this option is not available.) If an alarm transaction is displayed with
a camera icon to the left of the alarm description, right-click to view
live video from the camera(s) associated with the alarm’s
transaction as defined by its event trigger. Refer to Video Windows
- An Overview topic in this Help system for window management
information.
In order to view live video, the DVR must be online (if it is a
duplex recorder, the recorder must also be in record mode).
The following windows open: 1) Digital Video Viewer. Refer to
Digital Video Viewer Help for information about the Digital Video
Viewer. 2) Video window(s) displaying the current live view of the
camera(s) associated with the alarm transaction. Each window
displays a dialog box containing the current date and time.
View Recorded
(If a camera icon is not displayed to the left of the alarm description,
Video
this option is not available.) If an alarm transaction is displayed with
a camera icon to the left of the alarm description, select to view live
video from the camera(s) associated with the alarm’s transaction as
defined by its event trigger. Refer to Video Windows - An Overview
for window management information.
In order to view recorded video, the DVR must be online and
available, and not serving another request for playback of recorded
video based on this event.
The following windows open: 1) Digital Video Viewer window. Refer
to Digital Video Viewer Help for information about the Digital Video
Viewer. 2) Video window(s) displaying the current live view of the
camera(s) associated with the alarm transaction. Each window
displays a dialog box containing the current date and time.
View Single
Select to display the first frame of the event recording as a still
Recorded Frame
photo.
Secure Perfect 6.1.1 User Manual 98
Quick Launch
Select to automatically access live and recorded video from the
camera(s) associated with the alarm’s transaction as defined by its
event trigger. Refer to Video Windows - An Overview for window
management information.
In order to view live and recorded video, the DVR must be
online and available, and not serving another request for playback
of recorded video based on this event.
The following windows open: 1) Digital Video Viewer; 2) Video
window(s) displaying the current live view of the camera(s)
associated with the alarm transaction. Each window displays a
dialog box containing the current date and time. For additional
information, click Help on the Digital Video Viewer window.
Alarm Monitor Form Toolbar
Reference Topic:
Alarm Monitor Form Shortcut Menu
Click To
Remove all alarms from the Alarm Monitor.
Remove an individual alarm from the Alarm
Monitor.
Alarm Notifier
Administration Menu
The Alarm Notifier option opens the Alarm Notifier form, allowing you to accomplish the following:
• Assign the alarms/resets that will trigger an e-mail message.
• Assign people who will receive e-mail notification of the alarm condition.
• Format the e-mail message.
Alarm Response Tab
Reference Topic:
Alarm Monitoring Using the Alarm Monitor Form
Alarm Response Form
Use this tab to enter a predefined alarm response. This multi-line dialog box accepts 64 alphanumeric
characters. The responses you create and save will display as selections on the Alarm Monitor Form.
Alarm Routing and Bumping
Administration Menu Item
The Alarm Routing and Bumping option opens the Alarm Routing and Bumping form, allowing you to
do the following:
• Route alarms to one or more Client Groups by time schedule or at all times.
• Bump alarms to one or more Client Groups following a time lapse of an unacknowledged or
unpurged alarm to the Client Groups selected for bumping.
Secure Perfect 6.1.1 User Manual 99
Alarm Routing Client Group Assignment Dialog Box
This dialog box allows you to select and assign Client Groups for this routing record. Only Client Groups
in the operator’s facilities are available for assignment by this operator.
• Select, and then click the right arrow to assign an available Client Group.
• Select, and then click the left arrow to unassign a Client Group.
Click OK to close this dialog box and display the results in the Routing, Client Groups windowpane.
Alarm Selection Tab
Alarm Notifier Form
The Alarm Selection tab allows you to assign alarms in this operators’ facility that will trigger an e-mail
message.
Assigned Alarms:
This windowpane displays any previously assigned alarms.
Assign Alarms
Click Assign Alarms to display the Alarm Assignment dialog box that allows you to select specific alarms
that will trigger e-mail notifications. Click OK and the selected alarms will display in the Assigned Alarms
windowpane.
Transaction Type
Select one or both transaction types that will trigger an e-mail alarm notification.
• Alarm: E-mail notification is sent at onset of the alarm.
• Reset: E-mail notification is sent when an alarm is reset.
By default, no type is selected when you create a new Alarm Notifier record. A transaction type must be
selected in order to save this record.
Alarm Sense Time
This form allows you to add or edit the link between an event and an alarm sense time. The event
determines when and to what value the sense times for all alarms in the group are changed.
• Event: Select an event from the drop-down list. If there are no events listed, you will need to
configure events using the Event Schedule Form.
• New time: Select or enter a sense time. The value is in seconds and indicates the delay
before triggering an associated digital output or sending in a Secure Perfect alarm if the DI
type is Alarm. This number tells the system how many seconds to wait after sensing the input
has changed to Active State. Enter 00 to immediately send the transaction to the host,
notifying the host of a state change. Increase the Sense Time entry if using noisy or
chattering contacts.
Example: This value could indicate the delay time, in seconds, that elapses between the time a door
contact is broken and the time the output and alarms are triggered. If door contact is re-established
before the sense time elapses, the alarm would not come in to Secure Perfect and the output would not
activate.
Secure Perfect 6.1.1 User Manual 100
Alarm Tab
Alarm Form
The Alarm Tab configures the alarm.
Group: Displays the alarm group to which this alarm was assigned. The default is alarm group 0. You
can change to any other alarm group available on that micro, displayed on the drop-down list.
Owner Type: This is a read-only field and displays the object to which the alarm belongs or refers.
• API: Alarm is bi-directional and owned by the external interface.
• Board: Alarm is owned by the microcontroller.
• CCTV Interface: Alarm is owned by an interface.
• Client: Alarm is owned by a Regional Database client.
th
• Digital Input: Alarm is owned by the digital input, such as a motion sensor. (The 11
DI on a
Micro/PX-2000 or M/PXN-2000 is owned by the micro; it is a low-battery alarm from the
micro.)
• Failover: Alarm is owned by the host client.
• Guard Tour: Alarm is owned by a reader or digital input.
• Kalatel Camera: Alarm is owned by a Kalatel camera.
• Kalatel DVMR: Alarm is owned by a Kalatel DVR.
• Micro: Alarm is owned by a micro.
• Reader: Alarm is owned by a reader.
• Region Failover: Alarm is owned by the host Regional Database Server.
Settings:
• Monitor (Alarm, Short, Cut, Reset): If selected, this alarm, when triggered, will display all
alarm conditions available to this alarm on the Alarm Monitor Form. You have the option to
schedule alarm monitoring on the Schedule Tab of this form. If this option is NOT selected
but a schedule is in place, the schedule will monitor alarms only for the time that monitoring
th
is on. (Although the option to monitor is displayed for the 11
DI on a Micro/PX-2000 (low-
battery alarm), an alarm is not generated for Cut and Short.)
An operator can see alarms on the Alarm Monitor Form only for facilities that are currently
active and assigned to the current operator.
The option to monitor an alarm must be selected on the Alarm Form in order for a specific
alarm to display on the Alarm Monitor Form.
Alarms do not display on the Alarm Monitor Form if the selection to monitor an alarm is
removed, even though Alarm Routing and Bumping may be configured.
• Always monitor (Short, Cut, Reset): If selected, this alarm will always display Cut, Short, and
Reset conditions of alarms on the Alarm Monitor Form. Select this option if a schedule
prevents monitoring an alarm/reset condition during certain periods of the day but you still
want Short, Cut, and Reset to be monitored and displayed. (Although the option to monitor is
th
displayed for the 11
DI on a Micro/PX-2000 (low-battery alarm), an alarm is not generated
for Cut and Short.)
• Micro dial host: If selected, an alarm occurring on a dial-up micro, or micros downstream
from a dial-up micro, will cause the micro to dial the host in order to report the alarm.
• Operator acknowledge: If selected, the operator must acknowledge the alarm on the Alarm
Monitor Form before the alarm can be cleared.
• Priority: Select a number from 0 to 9 by clicking on the up and down arrow buttons to the
right of the field. This number indicates the priority of this alarm and tells the system (host) in
which order it should alert the operator should multiple alarms occur at the same time. The
lower the number, the higher the priority; therefore, 0 has the highest priority and 9 the
lowest.
Route alarms to history: If selected, alarm activity is written to the alarm history.
Print alarms: If selected, the alarm history transaction is printed on a selected system parallel/serial
printer when the alarm changes state between alarm and reset. Alarm transactions will print only if the
transaction is routed to the printer and the alarm transaction printer is selected. The selection of the alarm
transaction printer is done on the Client tab of the Client form.
If you modified this record, save before you exit the form.
Secure Perfect 6.1.1 User Manual 101
Alarms Tab - Alarm Routing and Bumping Form
Element Description
Alarms:
This windowpane displays the names of Alarms assigned to
this Routing and Bumping record.
Assign Alarms:
Click to display an Alarm Assignment dialog box that allows
you to assign Secure Perfect alarms to this Routing and
Bumping record.
Alarms Tab
Reference Topic:
Enable Alarm Video Pop-Up
Event Trigger Form
This tab allows you to select alarm(s) and alarm transaction type(s) that will become the source for this
Event Trigger.
Element Description
Transactions
Select one or both options as types of alarm transactions
to trigger an event. The alarm must be set for monitoring.
Alarm: An event is triggered as a result of an alarm.
Reset: An event is triggered as a result of an alarm reset.
Tag Selection
Select one of the Tag Selection options:
None: No tag is sent to the DVR for marking recorded
video or manipulating record rate.
Tag only: A tag is sent to the DVR for marking recorded
video at the camera(s) current record rate.
Tag as event: A tag is sent to the DVR for marking
recorded video and for changing the camera(s) record rate
to its event record rate settings.
Assign Alarms
Click to display an Alarm Assignment window, enabling
you to select and assign/unassign an alarm record for this
Event Trigger record. You can also unassign an alarm for
an Event Trigger.
Auto Pop-up
Select this checkbox to enable an automatic live video
pop-up window when an alarm occurs associated with this
alarm trigger. Additionally, the Enable Alarm Video Popup
must be enabled on the Operations menu. If this operators’
Permission for Digital Video Viewer is not made available,
this option will not activate even though selected here.
Secure Perfect 6.1.1 User Manual 102
Antipassback
Set the antipassback status to neutral for all badges in this micro.
Clicking this icon from the Micro Utility Form toolbar will access this option:
Antipassback Definitions
Antipassback (APB) is an access control feature designed and configured to reduce the chance of users
‘passing back’ their credential to another person attempting to gain access. When readers are designated
as entry (IN) or exit (OUT), the system is able to record whether a user in inside or outside at any time by
noting the last place their credential was used. If the last time it was used was at an IN reader, then the
system knows that they are inside. If the last time it was used was at an OUT reader, then the system
knows that they are outside.
• Active APB does not let a person re-enter unless they first exit. The user is unable to ‘pass back’ their
credential to allow a friend to gain entry.
• Passive APB records the status but does not enforce the status. The system knows where a person is
but does not stop them from entering twice. This type of system is often applied with time and
attendance.
• Tailgating refers to a user following another user through a door without presenting a credential. They
follow closely enough so they can get through the door or gate before it closes. Only the first user is
recorded as IN or OUT.
• Timed APB refers to a system where users are ‘forgiven’ after a certain length of time, configured in
minutes. After the configured time is expired, the user status is set to ‘neutral’ and the system allows
them to re-enter. This eliminates the need for an OUT reader and prevents a badge holder from re-
entering for that time period.
• Global APB tracks the user throughout the entire Secure Perfect network and across all micros. No
matter where a user is, their APB status is recorded.
• Regional APB (Secure Perfect Global Edition Systems) tracks the user within a Region. The user is
active in that Region only and inactive in all other Regions.
Secure Perfect 6.1.1 User Manual 103
APB Region Configuration Tab - Region Form
Use this tab to identify APB IN and APB OUT readers, and configure the APB behavior across Regions.
APB Entering Region: This listbox displays those readers that have been selected as APB IN readers
for the selected Region.
Assign: Click to assign APB IN readers to this region. Only readers previously configured as APB IN
readers are displayed for selection.
APB Exiting Region: This listbox displays those readers that have been selected as APB OUT readers
for the selected Region.
Assign: Click to assign APB OUT readers for this region. Only readers previously configured as APB
OUT readers are displayed for selection.
It may not be required or significant for the micros in a Region to report status to another Region. Select
from one of the following notification options:
1. Retain APB Status Across Regions: This is the default of three status options. If selected, the APB
status is recognized across all Regions in the Secure Perfect Global system. A badge can be
presented at an APB IN reader in one Region and at an APB OUT reader in a second Region. (Enable
Global APB must be selected on the Parameter Form.)
2. Invalidate Badge Across Regions: If selected, this option disables the badge in all other regions
when a person enters the selected Region by presenting the badge at an APB IN reader. The Activity
Monitor displays ‘Invalid APB IN’ or ‘Invalid APB OUT’ if you attempt to enter in or out of any other
Region. When a person exits the selected Region and the badge is presented at an APB OUT reader,
the badge becomes enabled in all other Regions. (Enable Global APB must be selected on the
Parameter Form.)
Example: Employees badging IN at a Miami office are tracked and not allowed to badge IN to another
location until they have presented their badge at an APB OUT reader in Miami.
3. Ignore APB Status Across Regions: If selected, the APB status is local to the selected Region and
status is retained within the Region. Regions are independent of each other and the status is not
recognzed by another Region.
API Connections
Reference Topic:
About Secure Perfect
Administration Menu
This option opens the API Connections form that allows you to define an interface license for external
application integration by assigning a description of the API (Application Program Interface), and then
assigning an application login, password, and host computer.
This option is unavailable if you are not licensed for an API connection.
Secure Perfect 6.1.1 User Manual 104
Appending Archive Databases
If you have a backup of a SecurePerfectArchive 3.x or later database, the data can be restored
using the SP Maintenance Utility. Backup and Restore functions are detailed in the Secure Perfect
Installation Guide.
The SP Maintenance Utility will also append badge history, alarm history, operator history, and where
appropriate, Digital Input history, Zone history, and DVR history data to the current
SecurePerfectArchive database. Current SecurePerfectArchive data will not be affected.
In order to use the Append utility, you must meet the following criteria:
• Backup SecurePerfectArchive files must be restored to a local or mapped network
directory folder.
• Free disk space that equals at least three times the size of your database backup file.
• The ‘sa’ password.
• Sufficient time and patience to complete the procedure.
To append data:
1. Open the SP Maintenance Utility and select Append from the menu bar.
2. Navigate to the Drive on the local computer where the backup file is located.
3. Select the Folder in which the backup file is located.
4. Select SecurePerfectArchive from the Backup Source File list.
5. Drag and drop the backup SecurePerfectArchive file to the Secure Perfect Archive Databases
Only: dialog box.
6. Enter the ‘sa’ password.
7. Click Append.
8. The Append process can take a considerable amount of time, depending on the size of the backup.
During the Append process, the application looks like it is not responding. This is normal.
9. When you have finished using the data, we recommend that you delete the appended data using
the Secure Perfect Parameter Form, Clear Archive tab. This will keep the current
SecurePerfectArchive file from becoming too large in size.
Archiving
Reference Topic:
Backing Up Data
An archive is a history of transactions. The archive is created automatically by Secure Perfect, based on
the time interval that you selected on the Parameters Form (Daily, Weekly, or Monthly). When you select
Weekly, you must also select a day of the week.)
If you select:
• Daily: The archive is appended every day beginning at 11:59:58 P.M.
• Weekly: The archive is appended every week on the day that you select, beginning at
11:59:58 P.M. (You must select a day of the week.) Any change in the scheduling occurs
immediately. For example, if archiving is taking place on Tuesdays and the schedule is
revised to archive on Wednesday, the archiving will occur one day later, on Wednesday.
• Monthly: The archive is appended on the last day of the month beginning at 11:59:58 P.M.
The Secure Perfect services do NOT have to be running. Archiving will occur as long as SQL Server
Agent services are running. Archiving process takes place independently of Secure Perfect. As long as
the SQL Server Agent services are running, the archive process will occur.
Determine the status of the SQL Server Agent service by navigating to Settings, Control Panel, then
Component Services through Windows Explorer. Check the Status of SQLAgent$SPSQL.
Archiving is performed on the database Server computer only.
Archiving creates a copy of the latest history transactions and then removes all the data from the history
Secure Perfect 6.1.1 User Manual 105
database. The data will be appended to the archive database until you decide the archive database has
grown too large.
The factors in determining whether the archive database is too large can be:
• The size of your hard drive.
• The performance you receive when running history reports.
• The length of time you need to keep data.
• Other factors specifically related to your installation.
To remove data from the archive database:
1. BACK UP YOUR SECURE PERFECT ARCHIVE DATABASE! You will have to back up the Secure
Perfect Archive database using utilities provided by SQL Server 2000 or by using the Secure
Perfect Maintenance Utility. After you perform the backup, label and store the media in a safe
place.
If you do not back up the SecurePerfectArchive, you will lose all the data stored in it.
2. Select the Administration menu, then Parameters.The Parameter Form opens with the Settings
tab displayed.
3. Select the Clear Archive tab. The Earliest Date in Archive DB and Latest Date in Archive DB
fields will indicate dates once you have clicked the Show Date button. If you do not have any
records in your archive database, the two date fields will state No Record.
4. Choose the Start Date of the data that you want to remove from your archive database by
selecting the month, then the day to begin your archive.
5. Choose the End Date of the data that you want to remove from your archive database by selecting
the month, then the day to end your archive.
6. Click Delete.
7. Click OK.
The deletion of an archive database is taking place in the background. Progress is indicated on
the status bar in the lower right side of the screen. The process may take hours to complete. The
length of time is dependent on the size of the archive database and the hardware components of
your computer.
8. Upon completion, a message displays: The records from the Archive database has been
successfully deleted! Click OK.
Arm/Disarm an Intrusion Zone
Arm/Disarm an Intrusion Zone Using Access Rights
Any card and keypad reader or keypad within a defined zone can be used to arm and disarm the zone
with a valid access right for the reader and an Intrusion Zone assigned.
Click the Show me icon to view a step-by-step animated demo.
Arm = * 1 # followed by a valid card read.
• If all alarm points are reset (not in an active state of alarm) and all doors closed, then all
readers are placed offline (doors locked) and alarm points are monitored on. The
corresponding Digital Output is fired as selected on the Intrusion Zone Form.
• When the zone is successfully armed, all readers in the zone provide visual indication that
the zone is armed.
We recommend using CASI brand readers, configured to display the PIN light ON or
flashing, depending on the selected reader model. A Zone armed transaction is generated
and displays on the Activity Monitor Form.
• When a zone is not successfully armed due to an invalid zone configuration on the Access
Right Form, an Arm/Disarm Failed, Invalid Access Right transaction is generated.
• If any alarm points are set (in an active state of alarm) or a door is open, the zone does not
become armed. An Arm/disarm Failed Zone not secure transaction is generated and
displayed on the Activity Monitor Form.
Secure Perfect 6.1.1 User Manual 106
Disarm = * 0 # followed by a valid card read.
• All alarm points in the zone are monitored off and readers in the zone are placed online for
normal operation.
We recommend using CASI brand readers, configured to display the PIN light switching
from ON or flashing to OFF, depending on the selected reader model. A Zone disarmed
transaction is generated and displays on the Activity Monitor Form.
• When a zone is not successfully disarmed due to an invalid badge, an Arm/disarm Failed,
Invalid Access Right transaction is generated.
• When a zone is disarmed, all normal access control rules apply for gaining access.
Arm/Disarm an Intrusion Zone Using Arm/Disarm Intrusion DI
All of the same rules apply as if arming or disarming using an access right.
• When the zone is successfully armed, all readers in the zone should provide visual indication
that the zone is armed and a Zone Armed transaction is generated on the Activity Monitor
Form.
• When a zone is not successfully armed, an Arm/disarm Failed transaction is generated.
• When a zone is disarmed, all normal access control rules apply for gaining access and a
Zone Disarmed transaction is generated.
Arrange Icons
Windows Menu
This option allows you to control multiple windows or forms. If you have several forms in progress, you
can temporarily minimize a form from view. Select this option to arrange the minimized form icons across
the bottom of your Secure Perfect display screen.
Assign Micro Phone Numbers Dialog Box
This dialog box allows you to select a micro from the Dial-Up Micro drop-down list and assign telephone
numbers used by this micro to reach the selected backup client.
• Click to display a list of only Dial-Up and Network + Dial-Up micros for the client record
displayed.
• When you select a micro from the drop-down list, the Phone numbers to reach backup client
xxxxxx fields become available for entry (where xxxxxx = name of selected client in the
Backup Clients list box ).
• When you enter a number in the first field, the Save button becomes available.
• All Number fields must contain a telephone number of up to 20 digits. If there is only one
telephone number for this micro to reach the backup client, repeat this number in all four
fields. (If you click Save after completing the first Number field, the system will automatically
complete all Number fields with a duplicate number.)
• Click Save to save the list of telephone numbers. The micro will dial the number in Number 1:
and then try the others in numerical order until connection it made.
• Click Close to exit the dialog box.
• Repeat the process for each micro in the Dial-up Micro drop-down list.
• Click Save to save this client record.
Secure Perfect 6.1.1 User Manual 107
Auto Shutdown of Client Services
Services will automatically shut down when a client closes the Secure Perfect application and meets ALL
of the following criteria:
1. Does not host any micros or DVRs.
2. Does not have any API connections.
3. Is not a Thin Client.
4. Is not a backup client or have any backup clients of its own.
5. Is not a CCTV client.
6. Is not hosting a Guard Tour.
7. Client form Enable Auto Shutdown is selected.
The shutting down of a particular client computer designates that license capacity unused. Now, that
license is available for another computer that can now be designated a Secure Perfect client.
Auto Update
Administration Menu
The Auto Update option opens the SP Auto Update Configuration Form that allows you to configure your
Secure Perfect network computer for automatic notification and installation of the latest Quick Fixes and
Service Packs.
Secure Perfect 6.1.1 User Manual 108
B
Backing Up Data
Reference Topics:
Appending Archive Databases
Archiving
Restoring Secure Perfect Databases
A backup is a copy of selected data. Since Secure Perfect does not contain a backup option, you can use
any method you like to back up the data. Because the Server computer contains the database, there is
no need to back up your Secure Perfect folder on your client computers.
You should keep two sets of backups, of the following Server computer files:
Secure Perfect Data: The data includes the following:
• Database: Contains configuration data such as badges and micros.
• History: Contains current history including badge transactions and operator history.
• Archive: Contains the latest copy of Secure Perfect history data.
• Images: Backup needed if you have Imaging installed. Contains the picture files of badge
holders.
• Signatures: Backup needed if you have Imaging installed. Contains the signature files of
badge holders.
• Graphics: Backup needed if you are using Alarm Graphics. Contains the alarm graphics
maps.
The SP Server program MUST NOT BE RUNNING when you attempt a backup of images,
signatures, or graphics!
You should back up this data more often since it changes so frequently. While your internal policies may
dictate your backup requirements, we recommend that you create a backup at least every week.
Entire Secure Perfect Installation
• The entire Secure Perfect folder should be backed up when you first set up the system and
have confirmed that it is working, and any time you upgrade. It is very important that you also
back up the registry settings. In most backup programs, you will be prompted to back up
these settings.
• ALWAYS MAINTAIN A CURRENT BACKUP. Should you have any problems with your
system, you can always restore your backup.
SP Enterprise Edition Systems use SQL Server utilities to back up the Secure Perfect database,
Secure Perfect History, and Secure Perfect Archive.
Click the Show me icon to view a step-by-step animated demo.
Secure Perfect Professional Edition Systems use the Secure Perfect Maintenance Utility to back up
the Secure Perfect database, Secure Perfect History, and Secure Perfect Archive information (tables and
queries).
Click the Show me icon to view a step-by-step animated demo.
Secure Perfect 6.1.1 User Manual 109
Backup Clients Assignment Dialog Box
This dialog box allows you to select and assign backup clients associated with the selected client. This
list includes only clients available for assignment by the current operator and defined as a client that does
not exceed the limit of micros and DVRs allowed. When you select a client from the list, you will note that
the client statement defines the total combined number of DVRs and micros of the default client and
backup client. (The total number of micros cannot exceed 64. The total number of DVRs cannot exceed
16.)
• Select, and then click the right arrow to assign an available client.
• Select, and then click the left arrow to unassign a client.
Click OK to display results in the Backup Clients list box.
Backup Clients Tab
Reference Topic:
Client Monitoring
Takeover and Recovery Timing
Client Form
This tab displays ONLY at client computers that are licensed for Client Redundancy. Use this tab to
configure your backup clients that would take over the devices in case of a failure at the default client
computer.
Backup Clients:
This list box displays those clients you have assigned to take over control of any nondirect micros and
DVRs in the event of a failure at the default client computer. The order in which the client names display,
determines which client is next in line to take over. The timing of the takeover is a variable. Backup
clients must be online (Secure Perfect services are running). In the event of a failover, the client entry
includes the client computer name, and then the total combined number of DVRs and micros of the
default client and backup client.
• Move Up: Select and click to move this client up the list.
• Move Down: Select and click to move this client down the list.
• Assign: Click to display a Backup Clients Assignment dialog box, listing client computers
found on your Secure Perfect system. Those computers selected and assigned when you
close the dialog box, will display in the Backup Clients list box.
Database Connection Heartbeat
The Secure Perfect system validates communication with backup clients by pinging (sending continuous
broadcast messages). If there is a communication failure between the default client and the backup
client, the backup client looks for a Heartbeat (time stamp in the database) as an indication that the
default client is online and connected. a) If a Heartbeat exists, the default client is "alive" and the backup
client will not initiate takeover of the devices from the default client. b) If a Heartbeat does NOT exist, the
backup client initiates takeover of devices from the default client. The backup client will use the following
values:
• Heartbeat (seconds): Select a computer from the Backup Clients list box and assign an
interval of seconds (the range is 10 to 180) between Heartbeat checks. The default number
is 60 seconds. This number can be reset at any time.
• Heartbeat Retries: Select the number of times (the range is 1 to 3) this backup client checks
for a Heartbeat stamp in the database, before initiating takeover of devices from the default
client. The default number of retries is 2.
Assign Micro Phone #s
This button is only available after completing the following:
• Backup clients have been assigned.
• The currently displayed client is host to Dial-up and/or Network + Dial-up micros.
Secure Perfect 6.1.1 User Manual 110
In the event of a system failure, the micros associated with the failed client must have available telephone
numbers to reach the backup client. Click to display an Assign Micro Phone Numbers dialog box.
Redundancy
Display Redundancy Notification:
By default, this check box is checked. If licensed for Client Redundancy, this check box must be selected
to generate a notification message, that will display at all clients (based on facilities available to the
current operator), when:
• A client failure occurs.
• A device takeover succeeded.
• A device takeover did not succeed. [Select Details button for explanation.]
(If the first-in-line backup client is not available, a second backup client will take over control
of devices and a notification message displays, updating you.)
• Recovery of the default client and transfer of devices failed. [Select Details button for
explanation.]
• Recovery succeeded.
If you clear this check box, you will not receive a notification message; however, indication of a take over
displays on the Client Monitor Form.
Perform Backup on Normal Shutdown: This check box is unchecked or clear by default. Select this
check box to trigger the takeover, by a specified backup client, of devices associated with a client during
a normal shut down.
If your system is not licensed and you are operating in demo mode, this option is not available for
selection.
Backup Region Assignment Dialog Box
A list displays, of available backup Regional Database Server computers.
• Select one or more computer names from the available list and then click the right arrow to
assign.
• Select one or more computer names from the assigned list and then click the left arrow to
unassign.
Click OK to accept the selections and close this window.
Secure Perfect 6.1.1 User Manual 111
Backup Regions Tab - Region Form
Reference Topic:
Backup Region Assignment Dialog Box
Global Editions systems can be configured for database redundancy, at the Regional level. A Regional
Database Server can assign another for backup in the event of a failure at the default Regional Database
Server.
Regional database redundancy and fileserver redundancy operate independently. One or the other, or
both can fail at the same time, whether they reside on the same server computer or are configured to
reside on separate computers. Secure Perfect initiates three tries to fail over to another fileserver. This
process is taking place in the background. After three tries with no success, an SPFileServer interface
attempts to locate an available fileserver. If all attempts fail, the interface generates an alarm.
If you select a failover Regional Server and want your clients to failover to the backup Server, you
must also select the Client Region Failover checkbox on the Client form, Client tab.
Element Description
Backup Regions
This list box displays those Regional Database Server
computers that you have assigned to take over control in
the event of a failure at the default Regional Database
Server. The order in which the computer names display,
determines which Server is next in line to take over.
Move Up
Select and click to move this Regional Server up the list.
Move Down
Select and click to move this Regional Server down the list.
Assign
Click to display a Backup Region Assignment dialog box,
listing available Regional Database Servers found on your
Secure Perfect Global Edition system. Those computers
selected and assigned when you close the dialog box, will
display in the Backup Regions list.
Badge
Personnel Menu
The Badge option opens the Badge Form that allows you to define a badge in the system. The badge
can then be linked to a person record in the system. More than one badge can be assigned to a person.
Badge
Reports Menu
The Badge option opens the Badge Report Form that allows you to create a report on the badges in your
Secure Perfect system.
Secure Perfect 6.1.1 User Manual 112
Badge Alias
Reference Topic:
Badge Alias Form
Personnel Menu
The Badge Alias option displays the Badge Alias Form that allows you to assign an alias number to the
physically encoded badge number (available only if an alias was assigned during installation).
Badge Alias Tab
Badge Alias Form
Use this tab to assign alias numbers to badge encoded numbers.
Encoded Number
Displays the badge’s encoded number.
Badge Alias
If you selected Manual aliasing during installation, enter the new number for the badge.
If you selected Automatic aliasing during installation, the number will be entered for you.
Find Badge
Click to display a Find Badge dialog box, select a reader, and present a badge at that reader. The record
is displayed that is associated with the badge presented.
Click Save.
• Alias badge numbers saved to the system are automatically preceded with a ‘1-‘
• If this is a Global Edition system, the badge alias number is preceded by the Region ID number that
uniquely identifies the Region. Therefore, the same alias number can be assigned across regions,
because the number is uniquely identified by the Region ID.
Badge Assignment Dialog Box
This window displays when you click Assign Tour Badges, enabling you to select and assign tour badges
to a tour.
• Multiple badges can be assigned to a guard tour, but if a badge is assigned to a tour, the
same badge cannot be assigned to any other tours.
• The same badge must be used to complete the entire tour.
• When a badge is assigned to a guard tour, the badge is downloaded to all micros that have
reader type tour points for that guard tour.
• If any reader is assigned as a tour point, at least one badge must be assigned to the tour.
• If all tour points are DIs, you do not need to assign a badge to the tour.
Click OK to display the results in the Tour Badges windowpane.
Secure Perfect 6.1.1 User Manual 113
Badge Definition Tab
Badge Form
Use this tab to define a badge.
Element Description
Assigned to
Select the name of the person to whom this badge is assigned. If this
badge is not yet assigned, select <UNASSIGNED>.
Refresh: Click to update the person list with the most up-to-date
information.
Click the Show me icon to view a
step-by-step animated demo.
Number
This number must be unique to Secure Perfect. It may be already
encoded into the card (if you are using a card) or you can assign a
number in this dialog box no more than 20 digits. This number will be
entered into a keypad reader when there is no card.
If you are using badge aliasing: The alias displays here as a read-only
number and cannot be changed. An alias number is assigned on the
Badge Alias Form. The encoded number will be entered into a keypad
reader.
Status
Only badges with the status of Active will be granted access through
readers.
• Active: The badge has been assigned to a person and may gain
access. An Active badge can be re-assigned as a Guard Tour
badge.
• Guard Tour: The badge has been assigned to a person and will be
used as a guard tour badge. A Guard Tour badge can be re-
assigned as an Active badge.
• Issuable: The badge has not yet been assigned to a person.
• Lost: The badge has been reported as lost.
• Remake: This badge has been damaged.
• Suspended: This badge was assigned to a person who no longer
works at the facility.
PIN Number
If this badge will be used with a badge-and-keypad reader, enter a
personal identification number here. This number will have to be entered
at the keypad in order to gain access with this badge.
This number must be four digits.
• Select this option to enforce ‘Extend Unlock Time’ for this badge
Follow Extend
record. If you assigned this badge to a person from the ‘Assigned to’
Unlock Time
drop-down list, this person is now allowed extra time to gain access
to an entry or exit point in the Secure Perfect system. Time
limitations are configured on the Door Functions tab of the Reader
Form.
• If this badge is being assigned to a person whose existing record
indicates that Extend Unlock Time is enforced, this checkbox will
display as already selected.
Example: An extended time limit beyond normal can be configured for
an employee who enters a motorized door by wheelchair.
Manual Control:
Resets the APB or T&A status of the current badge to neutral.
Reset APB and
T&A Status
Dates Click Calendar to select a date:
Issue: The date the badge was assigned and issued to a person.
Secure Perfect 6.1.1 User Manual 114
Expiration: The first date on which the badge will no longer grant
access. A blank value means the badge never expires.
Return: The date the badge was returned.
Last Valid Access Date: Date the last valid access was granted to the badge, as stored in
the Secure Perfect database.
Time: Time the last valid access was granted to the badge, as stored in
the Secure Perfect database.
Reader: Reader at which the last valid access was granted to the
badge, as stored in the Secure Perfect database.
Find Badge
Click to display a Find Badge dialog box, select a reader, and present a
badge at that reader. The record displays that is associated with the
badge presented.
Badge Design
Personnel Menu
The Badge Design option opens the Badge Design Form that allows you to create or format what will
print on your badge.
Badge Format
Administration Menu
The Badge Format option opens the Badge Format form that allows an operator to design, import, or
export custom badge formats into the micro. Custom magnetic stripe or Wiegand formats can be loaded
to your Secure Perfect system.
Badge Formats in 40-Bit and 55-Bit Wiegand Protocol
4002 - 40-Bit Wiegand Format
The 40 bits of transmission consist of two parity bits and 38 code bits. The first bit transmitted is the first
parity bit, P1; it is even parity calculated over the first 20 bits. The last bit transmitted is the second parity
bit, P2; it is odd parity calculated over the total 40 bits.
Code format:
F = Facility – 0 Digits
B = Badge Number (99.999.999.999 possible) 12 digits
This format was created to enable identical badge identification numbers to be produced in either
S-F/2F or Wiegand mode. These numbers are derived from the 40-bit binary code in the proximity
chip. The badge number is comprised of the 38 least significant bits. The most significant bit is set at
0.
5502 - 55-Bit Wiegand Format
The 55 bits of transmission consist of two parity bits and 53 code bits. The first bit transmitted is the first
parity bit, P1; it is even parity calculated over the first 27 bits. The last bit transmitted is the second parity
bit, P2; it is odd parity calculated over the total 55 bits.
Code format:
F = Facility – 0 digits
B = Badge Number – 16 digits
P = Parity Bit
Secure Perfect 6.1.1 User Manual 115
Badge Format Tab
Reference Topics:
Micro Flash and Micro Parameter Configuration
Badge Formats in 40-Bit and 55-Bit Wiegand Protocol
Badge Format Form
This tab allows you to identify the pattern of the data bits (mask) combination, in the badge numbers that
you will import or export to your micro and store in the Secure Perfect database.
Element Description
Format Type
Select from two data masks.
• Magnetic Stripe: The number is a mask embedded into a magnetic tape
strip and usually adhered to badges or credit cards.
• Wiegand: A pulse-generating mask sensed by a pickup coil (the reader).
This is a complex system to manufacture and virtually impossible to
duplicate making it one of the most secure access control technologies.
The number is a mask of a digital 0 or 1.
Position
Indicates the location or position of the bit where your mouse pointer is
presently positioned, in the mask combination.
• Magnetic Stripe:
Badge data layout
N = Badge or facility/site bit
(B,F,P,0,1)
B = Start character (With few exceptions, the start character is ‘B’ the
majority of the time.)
0 to 9, A, C, D, E. = Constant characters
= Space
• Wiegand: The following characters are acceptable. Also refer to the
Legend group box:
B = Badge identification (BID) bit
F = Facility/site code bit
P = Parity bit (an extra bit added for error detection or integrity testing)
0 or 1 = Constant characters
E = Parity layout - Even
O = Parity layout - Odd
= Space
The following settings apply to Wiegand Format ONLY:
Parity layout 1 (E, O): Indicates the first parity bit in the data mask. The entry must be an even (0) or
odd (a) parity bit.
Parity layout 2 (E, O): Indicates the second parity bit in the data mask. The entry must be an even
(0) or odd (1) parity bit.
Parity layout 3 (E, O): Indicates the third parity bit in the data mask. The entry must be an even (0)
or odd (1) parity bit.
Parity layout 4 (E, O): Indicates the fourth parity bit in the data mask. The entry must be an even (0)
or odd (1) parity bit.
Number of facility
The number of facility code bits in the data mask.
characters:
Numbers of badge
The number of badge number (BID) bits in the data mask.
characters:
Secure Perfect 6.1.1 User Manual 116
The following applies to all formats:
Import format from file This selection is enabled when you click New to add a new record. Click to
navigate to a network drive, CD, diskette, or a local drive of your computer
and import a Wiegand or magnetic stripe file.
(Example Wiegand File Name: *.wgd)
Export format to file
Click to navigate to a network drive, CD, diskette, or local drive of your
computer and export a Wiegand or magnetric stripe file.
Comments:
Enter text as an explanation or details of this procedure. The field accepts
256 characters.
Badge History
Reports Menu
The Badge History option opens the Badge History Report Form that allows you to create a report
based on the history of badge transactions in the system.
Secure Perfect 6.1.1 User Manual 117
C
Calendar Dialog
Select the day, month, and year of badge issue, return, or expiration. Click OK to accept the selected
date and close the form. Click Cancel to close the Calendar form without making any changes. Click
None to clear the date currently in the field.
Camera
Device Menu
The Camera option displays the Camera Form that allows you to edit the parameters of the selected
camera record. Camera records are automatically created when a DVR is defined.
Camera Preset
Administration Menu
The Camera Preset option opens the Camera Preset Form that allows you to label a preset camera
position and assign a number to that preset.
Camera Preset Assignment Dialog
A list of available camera presets displays. These presets were previously defined on the Camera Preset
Form.
• Select one or more presets from the available list and then click the right arrow to assign.
• Select one or more presets from the assigned list and then click the left arrow to unassign.
Click OK to accept the selections and close this window.
Can I Customize the Toolbar?
No. The toolbar cannot be customized.
Cascade
Window Menu
The Cascade option allows you to control multiple windows or forms. If you have several forms open but
not visible, select this option for a cascading view of your forms with the active form taking precedence on
the display screen.
Secure Perfect 6.1.1 User Manual 118
CCTV Alarm
Administration Menu
The CCTV Alarm options opens the CCTV Alarm Form that allows you to link CCTV alarms to Secure
Perfect alarms so that Secure Perfect alarms trigger CCTV events and display on the Secure Perfect
Alarm Monitor Form.
This form is NOT used in the Kalatel Integrated Digital Video option. It is only applicable in the serial
CCTV interface.
CCTV Alarm Assignment
This dialog box allows you to select and assign CCTV alarms to Secure Perfect alarms. Only CCTV
alarms in the operator’s facilities are available for assignment by this operator.
• Select, and then click the right arrow to assign an available alarm.
• Select, and then click the left arrow to unassign an alarm.
CCTV Tab
Alarm Form
Select this tab to assign CCTV alarms to Secure Perfect alarms. The windowpane displays the CCTV
alarms already assigned to this alarm.
Add/Remove: Click to display the CCTV Alarm Assignment dialog box that allows you to add or remove
items from the list.
CCTV Tab
CCTV Alarm Form
Use this tab to set up a CCTV alarm.
CCTV Interface: Select the Interface from the drop-down list. If there is no interface listed, then it has not
been installed.
CCTV Alarm: Select the alarm number from the drop-down list. When you assign a number, an enable
and disable message is automatically generated.
• Enable Message: An enable message is automatically generated when you select a number
in the CCTV Alarm field. You can edit these messages, but any changes to the CCTV alarm
number will overwrite the changes to this message.
• Disable Message: A disable message is automatically generated when you select a number
in the CCTV Alarm field. You can edit these messages, but any changes to the CCTV alarm
number will overwrite the changes to this message.
Reset CCTV Alarm:
• When the Secure Perfect alarm is cleared from the Alarm Monitor: Select this option if you
want the CCTV alarm to reset when the alarm is cleared from the Secure Perfect Alarm
Monitor.
• When the Secure Perfect alarm Resets: Select this option if you want the CCTV alarm to
reset when the alarm is reset in SP.
Change Password
Operations Menu
The Change Password option opens the Change Password Dialog Box that allows you to change your
password.
Secure Perfect 6.1.1 User Manual 119
Change State
If the micro is currently online, this will change the state to offline. If the micro is offline, this will change
the state to online.
Each time a micro is set to online, the database must be downloaded to the micro. If a new micro
database is required, click Download Database as well as Download Badges for the selected micro.
Download Database:
Download Badges:
Check for Update
Reference Topic:
SP Auto Update Configuration Form
File Menu
This item is enabled when the Enable Auto Update option is selected on the SP Auto Update
Configuration Form of the Administration menu.
Each time you log in, your Secure Perfect system checks for updates. Also, at any time, you may select
this item to begin a search of the configured Web site for updates to the Secure Perfect system. This
process searches for new upgrades, compares the version, and if the patch or update needs to be
applied, a dialog box displays a message.
• Click OK to close the dialog box and begin the update process.
• Click Cancel to close the dialog box and process the upgrade at another time.
• If the Web site cannot be reached, a message informs you that communication failed. Recheck your
update configuration settings and try again.
• If no new updates are available for your system, a message displays informing you that your system is
up to date.
Clear Archive Tab
Reference Topic:
Archiving
Appending Archive Databases
Parameters Form
Earliest Date in Current Archive DB: If you have an archive database, this date displays when you click
Show Date.
Latest Date in Current Archive DB: If you have an archive database, this date displays when you click
Show Date.
Show Date: If you have an archive database, click Show Date.
• The Earliest Date in Current Archive DB and Latest Date in Current Archive DB will display.
• If you do not have an archive database, the two date fields will state No Record.
Secure Perfect 6.1.1 User Manual 120
Archive Clean Period:
• Start Date: Select the Start Date of the data that you want to remove from your database by
selecting the month, then the day to begin your archive.
• End Date: Select the End Date of the data that you want to remove from your database by
selecting the month, then the day to end your archive.
• Delete: Press after selecting Start Date and End Date to remove from your database.
The deletion of an archive database takes place in the background. Progress is indicated on the
status bar. This may take hours to complete and is dependent on the size of the Archive database and
the hardware components of your computer.
Clear Button
This option clears all badge transactions from the Activity Monitor Form.
Clicking this icon from the Activity Monitor Form toolbar will access this option:
Clear Search
Search Menu
The Clear Search option clears all data in the current form. Use this option when the form has data and
you want to begin a new search. The option does not conduct a search nor does it affect any data in the
database. It only clears data from the form in preparation for a search or to cancel a change to a record.
The Clear Search option is available only when a form that contains records is open.
Clicking this icon from the Secure Perfect toolbar can also access this option:
Client
Administration Menu
The Client option opens the Client Form that allows you to merge a client computer to your Secure
Perfect system.
Client Assignment Dialog Box
This dialog box allows you to select and assign Secure Perfect client computers to a Client Group. Only
clients in the operator’s facilities are available for assignment by this operator.
• Select, and then click the right arrow to assign an available client.
• Select, and then click the left arrow to unassign a client.
Click OK to close this dialog box and display the results in the Clients windowpane.
Client Group
Administration Menu Item
The Client Group option opens the Client Group form, allowing you to assign Secure Perfect client
computers into logical groups. A comment box is available for entry to describe the configuration. Later,
client groups can be assigned to specific alarm routing and bumping configurations.
Secure Perfect 6.1.1 User Manual 121
Client Group Tab - Client Group Form
On this tab, you must assign at least one Secure Perfect client computer in order to save this Client
Group record.
Element Description
Clients:
This windowpane displays the names of client computers
that are assigned to this Client Group.
Assign Clients
Click to display a Client Assignment dialog box that allows
you to assign Secure Perfect clients to this Client Group.
Comments
Use this field to describe the reason for creating this group or
special considerations for this configuration. This field
accepts 256 characters.
Client Monitor
Operations Menu
The Client Monitor option opens the Client Monitor Form that allows you to obtain client information
such as client type, Imaging status, and connection status. The shortcut key combination for the Client
Monitor Form is CTRL+C.
Clicking this icon from the Secure Perfect toolbar can also access this option:
Secure Perfect 6.1.1 User Manual 122
Client Monitor Form Shortcut Menu
Reference Topics:
Client Monitor Form Toolbar
Client Form
Element Description
To disconnect the selected client.
Disconnect
To launch and enable a CCTV interface (other than integrated CCTV).
Launch
To display the Client Form, to add a client to the Secure Perfect network.
Client Form
To initiate recovery of a host that failed, was taken over by a backup client,
Recover
and is now able to host its original devices. When the default client is running,
a manual intervention is required to bring all its devices back to itself.
This option is enabled and available ONLY on the shortcut menu of the
default host that is now ready to be recovered.
- A notification message informs you of a successful recovery. Control of
devices is returned to the default host.
- A notification message informs you of an unsuccessful recovery. Verify
communication with the default host and retry the recovery.
To initiate recovery of a Regional Database Server host that failed, was taken
Recover Region
over by a backup Regional Server, and is now able to host its database.
This option is enabled and available ONLY on the shortcut menu of the
default host that is now ready to be recovered.
- A notification message informs you of an unsuccessful recovery.
To display the Manual Control form, for this operator to manually perform
Manual Control Form
operations on the system.
Client Monitor Form Toolbar
Reference Topics:
Client Monitor Form Shortcut Menu
Click To
Disconnect the selected client.
Enable a CCTV interface (other than integrated
CCTV).
Secure Perfect 6.1.1 User Manual 123
Client Redundancy Overview
The Secure Perfect software system is responsible for processing alarm and badge transactions from
devices like micros and DVRs. The software is responsible for writing these transactions to the database.
A device such as a micro or DVR is hosted by a single Secure Perfect client. The client could potentially
be responsible for hundreds of devices and can be a single point of failure. Although devices like the
micro are designed to run without the host software running for days, eventually memory is going to be
filled up at the micro end. The redundancy feature in SP 6.0 is designed to address this condition. Clients
can be configured to be backed up by other clients so that, in case of the default hosting client (called the
primary client) being disabled, one of the backup clients takes over all its devices. This is designed to
work automatically without any operator intervention so the system continues to work efficiently. One of
the backup clients performs the role of the default client until the default client is back up and running.
The devices that can be taken over at present are all DVRs, network micros, dialup micros, and network
+ dial up micros. Direct micros cannot be hosted by any other than the default client computer.
The table below will assist you to find the areas in this Help system, relating to the redundancy feature.
Reference Topics:
Configuring Client Redundancy:
Am I Licensed for Client Redundancy? About Secure Perfect
How do I configure backup clients for redundancy? Backup Clients Tab
What micros are supported?
Backup Clients Tab, Assign Micro Phone #s
What are the limits on micros and DVRs? Backup Clients Tab
What is not permitted? Backup Clients Tab
When a Failover Occurs:
Messages Displayed
Backup Clients Tab, Display Redundancy
Notification
Client Monitoring
Client Monitoring, Active Client
How long should I wait when a failover occurs?
Backup Clients Tab , Database Connection
Heartbeat
What alarms display on the Alarm Monitor?
Alarm Tab
What is the behavior on the Digital Video Viewer
and Network List?
Digital Video Viewer
Recovery:
Recovery Notification Messages
Backup Clients Tab, Display Redundancy
Notification
Client Monitoring Client Monitoring
How do I recover? Client Monitor Form Shortcut Menu
What happens when a default client is back up?
Backup Clients Tab, Display Redundancy
Notification
What is the timing on the recovery? Takeover and Recovery Timing
Secure Perfect 6.1.1 User Manual 124
Client Tab
Client Form
Element Description
• When creating a new client record, click Browse to display a Select Client
PC Name
window, listing all computers found on your network by PC name. (Secure
Perfect uses PC names only.) To add a client, select the computer name from
the list and click OK. You can add as many clients as you want but you are
limited to the number of licensed clients connected to the network at one time.
The number of client licenses presently active and connected to the Secure
Perfect system can be found on the Client Monitor form.
• By default, when an existing client record displays, PC Name is read-only and
not available for edit
• Client computers to which devices are associated, cannot be deleted. The
devices must be removed or assigned to another client before this client can
be deleted.
• Client computers assigned as backup clients cannot be deleted. You must first
un-assign this client from the Backup Clients list on the Backup Clients tab,
and then delete.
OS Type
When adding a Secure Perfect client to your system, accept the default OS Type
as Windows. When conducting a search, select either Windows or CCTV from
the drop-down list.
Region
This field is available only when you first open the Client form, and BEFORE you
initiate a Search. To locate a particular Server or client, you are able to select a
Server name from the Region drop-down list. The field default displays the
Database Server computer name. The clients associated with the selected
Region display in the right windowpane. (If you click Search immediately after
you open the Client form, this field displays the default Server name and is
unavailable for selection.)
• Disabled: Select if you want to disable Imaging in order to enable another
Imaging Status
client computer.
• Enabled: Select to enable Imaging here but you are limited to the number of
licensed Imaging stations enabled at one time. The number of Imaging
licenses presently active can be found on the Client Monitor form.
Thin Client
A Secure Perfect client computer can also be a thin client. A thin client has
Status
Terminal Services and/or Citrix Server software installed. If the Secure Perfect
client has Thin Client Status of Enabled, other computers can connect to the
Terminal or Citrix Server on the Secure Perfect client and run Secure Perfect.
• Disabled: Select if you want to disable the thin client option.
• Enabled: Select to enable the thin client option at this Secure Perfect client.
The number of thin clients you can enable is controlled by the number of thin
client licenses you have. Refer to the Client Monitor form, which displays the
number of thin client licenses presently available and in use.
Auto Logoff
Select the number of minutes the system will wait since the last action was taken
before logging off the current operator. To turn off the auto logoff feature and
remain permanently logged in, enter 0 (zero). The default setting is 20 minutes.
You must restart the Secure Perfect client program for changes to the Auto
Logoff selection to take effect.
Display Alarm
Enable this field if you want an alarm dialog box to display whenever an alarm
Notification
occurs, based on facilities available to the current operator.
Secure Perfect 6.1.1 User Manual 125
Client Region
This checkbox displays only on a Global Editions system.
Failover
This checkbox is applicable to Secure Perfect Global Edition systems. When
displayed, the default state of this checkbox is selected and grayed out. If a
database failure occurs at the default Regional Database Server, this client would
automatically fail over to a configured backup Regional Database Server.
Backups are configured on the Region Form, Backup Regions tab.
Click the checkbox to clear and disable the automatic failover option. You might
choose to clear this checkbox to prevent nonessential client failover.
Enable Auto
Secure Perfect services will automatically shut down when a client closes the
Shutdown
Secure Perfect application and meets all the Auto Shutdown criteria.
Ping Time
• Interval: This is the interval of time a broadcast message will be sent,
(msec)
indicating a client is online. (Default is 40,000. This field will not accept an
entry less than 5,000 msec.)
• Timeout: The amount of time that will elapse between broadcast message and
response before the system considers a client offline. The client status will
display on the Client Monitor form. (Default is 120,000. This field will not
accept an entry less than three times the Interval amount specified.)
ACTIVITY PRINTING
CAUTION: Windows 2003 or Win/XP Professional Operating Systems: If the printer you have
selected is hosted by a computer running a Windows 2003 or Win/XP Professional operating system,
you must add permissions to share this printer to the Secure Perfect network. At the host computer,
navigate to your printer property settings. On the Security tab, add ANONYMOUS LOGON or
NETWORK to the Security permissions.
Printers can be connected to the Server or any client computers. The defaults of the activity printer
selections are cleared on any newly configured system. Any system with a newly converted database
will require reconfiguration of these activity printer selections at each client workstation.
Alarm and
You must enable, select a printer, and route alarms to a printer in order for
Guard Tour DI
alarm activity to print.
Activity Printing
• Enable: Select this check box to print alarm activity. If you select to enable
alarm activity printing, you must select a printer in order to save this record.
• Printer: Displays the currently selected printer to which alarm activity will
print. This may be the same or a different printer than that used for badge
transactions.
• Select Printer: Click this button to select a printer to which alarm activity will
print.
Print Alarms At Host must be selected on the Alarm Form in order for alarm
activity to print.
Badge and Zone
You must enable, select a printer, and route badge activity to a printer in order
Activity Printing
to print badge transactions.
• Enable: Select this check box to print badge activity. If you select to enable
badge and zone activity printing, you must select a printer in order to save
this record.
• Printer: Displays the currently selected printer to which badge transactions
will print. This may be the same or a different printer than that used for alarm
activity.
• Select Printer: Click to select a printer to which badge transactions will print.
1) Printer options must be selected on the Reader Form in order for badge
transactions to print. 2) All zone activity transactions print and do not follow
routing or schedules assigned to a reader.
Secure Perfect 6.1.1 User Manual 126
Comments Tab
Micro Form
This tab and windowpane are provided to enter information about this micro, such as location data.
Communication Settings Tab
Reference Topic:
Dial-Up Troubleshooting
Parameters Form
Use this tab to select the modems that will be used for dial-up micros.
Installed Modems: Displays all modems currently installed on the PC. To designate a modem for use
with a dial-up micro, enable it by clicking in the box to the left of the modem name so that a check
displays. If you have a modem installed for support use, DO NOT SELECT THAT MODEM.
Disconnect After Idle: Select the number of minutes you want the system to wait before disconnecting
from the micro when the connection is idle (there is no history or database information being exchanged).
If you select 0, the connection will remain active indefinitely and the host will never drop communication
with the micros.
Network Port Range:
• If you communicate with your micros over a local intranet, this does not apply. Ignore these
remarks.
• If you must cross a firewall to communicate with your micros, you will need to read the
following:
Low end:/High end: You will be required to open up a range of ports sufficient to support the number of
micros with which you must communicate outside a firewall. The first ten port addresses are reserved for
client-to-client communication. Anything beyond the first ten port addresses can be used for micro
communication.
Example Addresses:
Default Low end: 6700
Default High end: 6709
(These are the 10 internal port addresses reserved for client-to-client communication.)
Change High end: to: 6710 = Assign address to 1 micro outside the firewall.
6711 = Assign addresses to 2 micros outside the firewall.
6712 = Assign addresses to 3 micros outside the firewall.
Communications Settings Tab
Digital Video Recorder Form
Use this tab to assign or edit a TCP/IP address, PTZ control, event tagging, and clock time
synchronization.
TCP/IP Address
Assign or edit the TCP/IP network address for the DVR.
PTZ Control
Select TCP/IP or None. The default is None. TCP/IP is to be selected if cameras with PTZ capability are
configured on this DVR and require control from SP. None is to be selected if all cameras on this DVR
are either fixed or if no control of PTZ cameras is desired.
Secure Perfect 6.1.1 User Manual 127
Event Tagging
Select TCP/IP or None. The default is None. Select TCP/IP if event triggers are required to tag recorded
video upon activity from defined readers and alarms. Select None if no tagging of recorded video is
required for event triggers and only access to live video is desired upon activity from defined readers and
alarms.
Time Sync Interval
The DVR date and time clock can be syncronized by its host computer to ensure that access control,
alarm, and video events across the entire system are time stamped in sync. When DVRs on a centralized
system reside in different time zones, the DVRs should be hosted by computers in their same time zone.
The Secure Perfect hosting computers will synchronize their DVR clocks at the interval selected as well
as immediately manage any system date and time changes including daylight savings time. Select one:
• None (default)
• 1 Hour
• 4 Hours
• 8 Hours
• 12 Hours
• 24 Hours
If DVRs are required to be synchronized with the Secure Perfect system date and time clock, 12 Hours is
a recommended setting for most systems.
Conditions of Mass Update
The time to process a mass update depends on your system performance, number, and type of
updates. Specifically, the badge learn and alarm processing functions may be influenced. We
recommend that you schedule mass update processing during off-peak hours for your company.
• GE Security has set 200 as the default maximum number of records that can process
updates at one time. However, this number is configurable. Call GE Security Customer
Support for assistance if you want to reconfigure the default.
• ONLY those fields or dialog boxes that are available for mass update changes are enabled in
Mass Update mode.
• Navigating from any form to another form in Mass Update mode will take that form out of
Mass Update mode.
Person Form:
• The following fields are available for mass update: Facility, Personnel Type, Department, and
Access Rights.
Badge Form:
• The following fields are available for mass update: Assign To, Status, Dates – Issue, Dates –
Expiration, and Dates – Return.
• When changing an assigned badge to unassigned, the status automatically changes to
Issuable.
• When changing status to Issuable, a message displays a Yes or No option. If Yes, the status
automatically changes to Issuable and selected badges are unassigned.
• When changing an unassigned badge (status is Issuable) to an assigned person, the status
changes to Active.
• Records selected for mass update with a status changing to anything other than Issuable will
cause a check for badge assignment.
• If any badge in the mass update selection is not currently assigned, these badge records
become unavailable and a message displays indicating they are unavailable.
Secure Perfect 6.1.1 User Manual 128
Create Default Template
File Menu
Select this option to create a default Report template. This option is available only when a Report Form is
displaying.
If a specific date is part of this template, whenever this report is run, it will use that date; therefore, it is
important to update the calendar criteria as needed.
Creating a Dial-Up Micro Record
Reference Topic:
Records Generation
Set up your modem(s) through the Server or client computer’s operating system. Refer to the
documentation you received with your modem.
1. Select the Administration menu, then select Parameters.
2. Select the Communication Settings tab, and enable the modem(s) that will be used for micros. You
will need to stop the SP Server computer and then restart it.
3. Once you restart Secure Perfect and log in, select the Device menu, then Micro.
4. On the Micro Definition tab, default values will be filled in for the following fields: Head of line and
Badge Loading.
Enter the address of the micro.
Enter the type of micro.
If this micro is the first micro on a string of micros, select Yes under Head of line. Otherwise,
select No and select the head of line micro. If this is a downstream micro that you are adding,
the micro directly upstream (towards the host) from it will need to be reset in order for it to
recognize the micro you are adding.
Example:
If your line of micros looks like this:
Host – Micro 1 – Micro 2
And you want to add Micro 3 to the end of the line so that it now looked like this:
Host – Micro 1 – Micro 2 – Micro 3
Then you would need to reset Micro 2 in order for Micro 3 to be recognized.
For Connection type, select Dial-up.
Select a Badge Loading method.
5. On the Password tab, if you do not enter passwords, the default passwords (one-1, two-2, three-3,
and four-4) are used. If you want to change the passwords, you may do so at any time.
6. On the Time Zone tab, verify and adjust time zone settings as necessary.
7. On the Comments tab, you may enter any information you want or leave this tab blank.
8. On the Events tab, you may want to schedule when APB and T&A are reset and when the host
dials the micro. If you select an event for the Dial field (host dials the micro), you must stop and
restart the SP Server before the host will recognize the event settings.
9. Select the Status tab to view information about the micro such as the firmware version. You can
request the latest information by clicking Refresh.
10. On the Settings to Reach Host tab:
Enter the telephone number(s) that the micro will dial to reach the host.
Enter the interval at which the micro will automatically dial the host.
Enter the number of times the micro will try the same number.
Enter the number of intervals that the micro will wait before trying a telephone number again.
11. On the Settings to Reach Micro tab:
Enter the telephone number(s) that the host will dial to reach the micro.
Enter the interval at which the host will automatically dial the micro.
Enter the number of times the host will try the same number.
Enter the number of intervals that the host will wait before trying a telephone number again.
Secure Perfect 6.1.1 User Manual 129
12. On the Micro Configuration tab, select the boards that are in the micro you are setting up. Click the
desired board in the Boards and drag to the Configuration column. To delete a board from the
Configuration column, select then right-click and select Delete.
13. Click Save to save the record. If there is any required information missing, a message will display
listing those items that are incorrect or missing. Do not forget to save the record again once you fix
those items.
14. When the micro record is created, the records for the associated readers, alarms, alarm groups,
digital outputs, and digital output groups are also created with default data based on the boards you
added on the Micro Configuration tab.
15. Use the Micro Utilities Form to set the micro online.
Creating a Direct-Connect Micro Record
Reference Topic:
Records Generation
1. On the Micro Definition tab of the Micro Form, default values will be filled in for Head of line and
Badge Loading. Complete the following:
Enter the address of the micro.
Enter the type of micro.
If this micro is the first micro on a string of micros, select Yes under Head of line. Otherwise,
select No and select the head of line micro. If this is a downstream micro that you are adding,
the micro directly upstream (towards the host) from it will need to be reset in order for it to
recognize the micro you are adding.
Example:
If your line of micros looks like this:
Host – Micro 1 – Micro 2
And you want to add Micro 3 to the end of the line so that it now looked like this:
Host – Micro 1 – Micro 2 – Micro 3
Then you would need to reset Micro 2 in order for Micro 3 to be recognized.
For connection type, select Direct.
Set Host keep alive time interval.
Enter the PC name of the host computer or navigate and select.
Select a method.
2. On the Password tab, if you do not enter passwords, the default passwords (one-1, two-2, three-3,
and four-4) are used. If you want to change the passwords, you can do so at any time.
3. On the Time Zone tab, a default time zone is filled in. Verify and adjust time zone settings as
necessary.
4. On the Comments tab, enter any information you want or leave blank.
5. On the Events tab, you may want to schedule when APB and T&A are reset.
6. Select the Status tab to view information about the micro such as the firmware version. You can
request the latest information by clicking Refresh.
7. On the Micro Configuration tab, select the boards that are in the micro you are setting up. Click the
board you want and drag to the Configuration column.
8. To delete, select a board from the Configuration column, right-click and select Delete.
9. Click Save. If there is any required information missing, a window will display listing those items
that are incorrect or missing. Don’t forget to save the record again once you fix those items.
10. When the micro record is created, the records for the associated readers, alarms, alarm groups,
digital outputs, and digital output groups are also created with default data based on the boards you
added on the Micro Configuration tab.
11. Use the Micro Utility Form to set the micro online.
Secure Perfect 6.1.1 User Manual 130
D
Database Tab - Reports
Alarm History, Badge History, Zone History, DI History, Time and Attendance, or Operator History
Reports
Use this tab to select the history database to use for this report. The file name displayed on the tab is the
currently selected archive database.
• Select archive database: Click to select the archive history database.
• Use default: Click to use the current history database.
Database Utilites
The Integrity utility runs automatically, following a database creation or conversion and upgrade from a
previous version of Secure Perfect. No user interaction is required.
The utility can be run manually if you want to check your database integrity. The system compares and
validates the integrity of your database schema. If selected, the system will automatically correct missing
or incorrect schema properties such as columns, keys, constraints, indexes, triggers, and tables. The
executable file is installed with Secure Perfect and resides in the Secure Perfect program folder.
1. Locate and double-click the DatabaseIntegrity.exe file to manually run the utility.
2. Enter the Server Name or click the browse button and navigate to the appropriate Server Name.
3. Enter the SQL system administrator ‘sa’ Database Password or accept the encrypted database
password of the default Server.
4. Click Connect to locate and connect to the Secure Perfect databases. The remaining selections are
now enabled. Accept the default options or review and disable selections.
5. Select one of two options:
Verify that Check Database Integrity is selected.
OPTIONAL: Select the Autocorrect checkbox. This feature runs only once and
corrects obvious schema in the database. Results display in a report.
Autocorrect is not available on a Global Edition system.
Select which databases to check.
Select Start to begin. Wait as the Database Integrity tool compares and validates the
integrity of your database. Messages generate to an IntegrityCheck.html file in
your Secure Perfect application Logs folder.
OR
Select Unlock Database Mutex to unlock the shared resource. Select Unlock to
unlock the database mutex for SPSQL.
6. Click OK when the Application Success window displays.
Secure Perfect 6.1.1 User Manual 131
7. Click View Integrity Report to review the messages generated to an IntegrityCheck.html file in your
Secure Perfect application Logs folder. Review the file to determine if database errors were detected.
OR
Click Close to close the window and exit.
The Replication tab is applicable to systems that have Secure Perfect Global Edition installed. We
recommend that you call GE Security Customer Support for assistance in setting the parameters for the
Global Edition database replication.
Date Range Tab - Reports
Roll Call, Alarm History, Badge History, Zone History, DI History, Time and Attendance History, or
Operator History Reports
Use this tab to select a date and time range on which to base this report.
• Daily time range: Will report on transactions that occurred between the start and stop time
each day in the date range. For example, you select a start time of 8:00 a.m., a stop time of
5:00 p.m., a start day of April 1 and a stop day of April 5. You will receive a report of badge
transactions occurring between 8:00 a.m. through 5:00 p.m. each day of the day range.
• Continuous time span: Continuous will report on transactions that occurred between the start
time on the start day to the stop time on the stop day. For example, you select a start time of
8:00 a.m., a stop time of 5:00 p.m., a start day of April 1 and a stop day of April 5. You will
receive a report of alarm transactions occurring between 8:00 a.m. on April 1 through 5:00
p.m. on April 5.
• Start Date: Select the start date range by clicking the desired day on the calendar. To move
ahead or back by a month, click the arrows on either side of the name of the month. To move
ahead or back by a year, click the arrows on either side of the year.
• Start Time: Accept the default start time as displayed or enter a start time.
• Stop Date: Enter an end date range by clicking the desired day on the calendar. To move
ahead or back by a month, click the arrows on either side of the name of the month. To move
ahead or back by a year, click the arrows on either side of the year.
• Stop Time: Accept the default stop time as displayed or enter a stop time.
Definition Tab - Alarm Routing and Bumping Form
This tab allows you to configure the routing of alarms to selected Client Groups according to a schedule
or at all times. Additionally, you can select Client Groups and set a time to bump the alarm to an
additional location.
• You can configure both Routing and Bumping, only a Routing record, or only a Bumping
record.
• Client Groups can be part of any Region in a Secure Perfect Global Edition system.
Element Description
ROUTING:
Client Groups
This windowpane displays the names of Client Groups
assigned to this Routing record.
Assign Client Groups
Click to display an Alarm Routing Client Group Assignment
dialog box that allows you to assign Secure Perfect Client
Groups to this Routing record.
Select one of the following options:
• Always
Select this option if you always want this Client Group to
receive alarms.
• Time Schedule
Select this option to enable the Time Schedule drop-down list
and then select a Time Schedule from the list.
Secure Perfect 6.1.1 User Manual 132
BUMPING:
Client Groups
This windowpane displays the names of Client Groups
assigned to this Bumping record. Typically, the Client Groups
displayed here are different than those assigned to Routing.
Assign Client Groups
Click to display an Alarm Bumping Client Group Assignment
dialog box that allows you to assign Secure Perfect Client
Groups to the Bumping record.
Time To Bump:
• Minutes
• Select the number of minutes to wait before bumping this
alarm notification to an additional location, if the alarm is not
acknowledged or purged at the Routing work station. The
Alarm Monitor form will indicate that this alarm is bumped.
The minimum setting is one minute. The default and
maximum is 30 minutes.
• Seconds
• Select the number of seconds to wait before bumping this
alarm notification to an additional location. The default is
zero.
• Comments
• Use this field to describe the reason for creating this record
or special considerations for this configuration. This field
accepts 256 characters. It is not necessary to complete an
entry in this field.
Definition Tab - API Connections Form
Enter information that defines an interface license for external application integration to Secure Perfect.
Application Login: Enter the login used by the external application to connect and access the API. Each
login must be unique.
Password: We recommend a noncryptic password. The password must be greater than four
alphanumeric or wildcard characters, with no spaces. The password is NOT case sensitive.
Confirm Password: Enter the password a second time.
PC Name: From the drop-down list, select the Secure Perfect computer that will host the external
application.
Definition Tab - Camera Form
This tab displays the camera channel address, with which DVR this camera is associated, and camera
type configurable for Fixed or PTZ. The camera can be enabled or disabled for viewing and managing
from within SP. Use this form to edit the parameters of the selected camera record.
Address
This is a read-only field. The address of the camera is automatically assigned. The address is a 2-digit
number that corresponds to the camera channel on the back of the DVR.
DVMR
This is a read-only field. This field displays the corresponding DVR with which this camera is associated.
Camera Type
Select a type of camera behavior as Fixed or PTZ from the drop-down list.
Enable Camera
By default, this checkbox is selected. The camera can be enabled or disabled for viewing and managing
from within Secure Perfect and setting accessibility from the Digital Video Viewer. Disabled cameras will
not display on the Digital Video Viewer.
Secure Perfect 6.1.1 User Manual 133
Definition Tab - Camera Preset Form
Preset
In this text field, enter a number within the range of 1 to 32. This number will only reference the preset
number programmed and stored in a camera with PTZ capability. Click Save. This preset is now
available for assignment, to a specific camera.
Definition Tab - Digital Video Recorder Form
Use this tab to assign or edit a bus address, type, host computer, or poll time.
Field Description
DVR
Enter a DVR Address, a unique Secure Perfect logical address
Address
associated with this DVR (from 1 to 255). This field will not be
available to edit existing records. This number is used in Secure
Perfect software to uniquely identify the DVR and its related
records.
DVR Type
Select a DVR type from the drop-down list. Secure Perfect currently
supports: 4, 10, and 16-camera channel multiplexer/recorder
models from Kalatel. This field will not be available for edit on
existing records. When you click Save, the number of camera
records will be created equivalent to the type of DVR you selected.
Bus
The bus address is a 2-digit field in the range of 1 to 32. The bus
Address
address refers to the physical DVR device address on the RS-485
bus and must be entered when multiple DVRs exist on a single bus
and/or for controlling camera(s) with PTZ capability.
Host
Select a Default Hostname from the drop-down list that will host
Computer
the defined DVR and act as its communications server.
If the Default Hostname computer is in a failover condition, you
cannot re-assign this DVR to any other Host computer except the
Active Client that is presently hosting this device.
• Enter Poll Interval as the length of time in seconds that will
Poll Time
elapse prior to a staus request being sent to the DVR for
(seconds)
verification of communications and processing of error and/or
alarm messages since the last poll.
• Enter Timeout as a length of time to wait for a response after a
request prior to retrying (if no response has been returned).
• Enter Retry Interval as the length of time to wait between
retries.
• Enter Retry Count as the number of retries to attempt before
qualifying a communications failure.
Delete Record
File Menu Item
The Delete Record option deletes the current record from the database. BE CAREFUL when selecting
this option, as deleted records cannot be recovered! The Delete Record option is available only when a
form is open, contains records, and you have been given all permissions.
Some forms such as the Reader Form do not have a delete option.
Clicking this icon from the Secure Perfect toolbar can also access this option:
Secure Perfect 6.1.1 User Manual 134
Delete Template
File Menu
Select this option to delete the current Report template. This option is available only when a Report Form
is displaying with a loaded template.
<deleted> Displays After I Delete All the Records
To correct this, click Clear, and then click Add.
Department
Personnel Menu
The Department option opens the Department form that allows you to create departments that can then
be assigned to person records.
Department Tab
Department Form
Click Search to display or modify a list of existing departments. Click Add to create additional department
records of your own, based on your company.
DES/DES III Data Encryption Standards
Data Encryption is additional security assigned to protect the Host-to-micro exchange of information. The
data messages are encrypted.
Methods of Encryption
• DES: This option uses a single pass of authentication and 16 unique hex characters are
required.
• DES III: This method of encryption uses a three-pass authentication process. Starting at the
left, the first pass authenticates 16 hex characters. The second pass authenticates 16 hex
characters. The third pass authenticates all 48 hex characters.
Secure Perfect 6.1.1 User Manual 135
Design Tab
Badge Design Form
Use this tab to create a new badge design record. If you are editing an existing design, these options are
not available.
Select one of the following:
• Select Default Layout: Select a badge default layout as Portrait or Landscape.
• Select Import Layout: Select Import Layout to make available the option to Browse to the Secure
Perfect designs folder and import an existing design. If you have already chosen a default layout,
this option is unavailable.
• Click Save to enable the Edit Badge Design button.
Edit Badge Design: Click to open the badge designer program that allows you to draw the graphics that
comprise the badge design. If you had a previous version of badge designer that created files with a
.gdr extension, you will be prompted to save the file as a .dgn when you edit a badge design for the
first time. Access the extensive Online Help system from the Badge Designer toolbar. Additionally, refer
to the Badge Designer User Manual, and review the "What’s New" section. A PDF file of the manual is
provided on your documentation CD.
• Each workstation where badge design or badge printing is to be performed must have its own
license. Refer to your Secure Perfect Installation Guide for additional details.
• If Imaging Status is not enabled for this client workstation, this feature is unavailable.
Device Configuration
Reports Menu
The Device Configuration option opens the Device Report Form that allows you to create a report on
devices such as micros, readers, alarms, alarm groups, digital outputs, digital output groups, digital
inputs, DVRs, cameras, and elevators.
Device Menu Selections
The following selections display in the Device drop-down menu:
Micro
Reader
Alarm
Alarm Group
Digital Output
Digital Output Group
Digital Input
Elevator
Digital Video Recorder
Camera
Secure Perfect 6.1.1 User Manual 136
Diagnostic Setting
Administration Menu
The Diagnostic Setting option opens the Diagnostic Setting Form that allows you to select items for
which diagnostic information will be recorded in the diagnostics log, as created on the LogFile Form. This
is a good place to start troubleshooting.
Diagnostic Viewer
Administration Menu
The Diagnostic Viewer option opens the DiagView program. The items you selected on the Diagnostic
Setting Form determine the debug messages displayed by the DiagView program.
The DiagView program has its own Help system for additional details.
Diagnostic Viewer
When you select Diagnostic Viewer on the Administration menu, the DiagView program opens. The
activities of your selected component are displayed. (Those items with the COM # and Line # as part of
the component name have the highest effect on system performance and hard drive usage.)
The DiagView Help system provides additional details of the program.
Dial-Up/Hangup
If the dial-up micro is currently connected, this option will disconnect from the micro.
Clicking this icon from the Micro Utility Form toolbar will access this option:
Secure Perfect 6.1.1 User Manual 137
Dial-Up Troubleshooting
Reference Topic:
Micro Utility Form
Your DiagView program logfile will indicate modem status by displaying one of two possible messages:
Message 1: The following modem is not functioning properly: <modem name>.
Message 2: The following modem is functioning properly: <modem name>.
Where <modem name> is the name of the modem, such as Hayes Accura 33.6.
Message 1 will display on the logfile every 90 seconds following a period when the modem is NOT
operating, until the modem is available and operational again. Verify the following:
• Selected modem on Parameters Form is identical to the modem you want to use. (If the
modem you want to use is not on the list of available modems, you may have to reinstall the
driver for the modem or select another modem.)
• Modem is turned on.
• Comm port connection is complete.
• Connection is plugged in properly.
• Modem settings are correct. (Maximum speed value of 9600 applies to MOST modems. If
you are having problems using this setting, refer to your modem manual for more
information.)
Message 2 will display ONE time only, and that is when your modem returns to operational after a period
when the modem was NOT operational.
The Micro Utility Form will indicate that the micro dedicated to a modem is in an error state.
Secure Perfect 6.1.1 User Manual 138
DI Board Records Creation
When you add a 20 DI board, twenty (20) digital input records are created.
Example: 0001-1-01 DI
This digital input is on micro 1, board 1, point 1. To change this description, enter text over the existing
text and save the record. It is recommended that you keep the mmmm-b-pp prefix in each digital input
displayed to aid in locating the alarm points on the physical hardware. This field accepts a maximum of
64 characters.
Micro/PX-2000 ONLY: When you create and save a Micro/PX-2000 record, Secure Perfect creates
th
and supports 11 DI points; however, the 11
DI is a low-battery alarm from the micro.
th
To configure the 11
DI to function as a low-battery alarm:
1. Open the Digital Input form from the Devices menu and click Search to display a list of digital
inputs.
2. Select the DI labeled XXXX-X-11
th
where 11 is the 11
DI point of the Micro/PX-2000 micro board.
3. Select Alarm, from the drop-down list of available DI types.
4. Click Save.
5. Open the Alarm Form from the Devices menu and click Search to display a list of alarms belonging
to the micros.
6. Select the DI labeled XXXX-X-11
th
where 11 is the 11
DI point of the Micro/PX-2000 micro board.
7. Extend the Description entry by entering text indicating low battery.
The entry may look similar to 0002-2-11 Low Battery.
8. On the Alarm tab of the Alarm Form, select Monitor from the Settings options.
9. Click Save.
Digital Input
Device Menu
The Digital Input option opens the Digital Input form that allows you to modify the records that are
automatically generated when you define a micro. Example: Configure physical sensing devices such as
door sensors or motion sensors.
Digital Input Status
Operations Menu
The Digital Input Status option opens the Digital Input Status form that provides the status of the
selected digital input according to the information in the micro’s database.
Secure Perfect 6.1.1 User Manual 139
Digital Input Tab
Reference Topic:
DI Board Records Creation
Digital Input Form
Use this tab to configure the selected digital input.
Element Description
Micro
Displays the micro description to which this digital input is associated. This is a read-
only field and unavailable for modification.
Board
Displays the micro board number where this digital input is located. This is a read-only
field and unavailable for modification.
Number
Displays the number of the digital input. This is a read-only field and unavailable for
modification.
Type Select the type of DI that you are configuring. If you select another Type, click Search to
update the list box display of associated triggers.
• Alarm means that this digital input is being used to trigger an alarm.
• Elevator means this digital input is being used for elevator control.
• Inactive means this digital input is not being used at this time.
• Digital Output means this digital input is being used to trigger a digital output and no
alarm is generated.
• Intrusion means this digital input will arm/disarm an intrusion zone.
• Guard Tour means this digital input is a point along a pre-determined inspection
tour of your premises by a security officer.
Digital input Type of Intrusion can only be made if the previous type was Inactive,
meaning no other access control digital input was active. (For example, you cannot
assign Intrusion type to a DI that was previously set as an Alarm; the DI type must first
be Inactive.) Be aware that selection of this type overrides any access control. You
cannot assign any access control digital outputs, digital output groups, schedules, or
events for this record.
Active State
The active state of a selected digital input can be either Closed or Open.
A third option, Both, displays as grayed out and unavailable for selection unless the
DI Type is Guard Tour. During a Guard Tour, a single-state trigger (one-time "hit") will
trigger a DO in both states (Closed OR Open).
Enabled
If you selected Digital Output as the Type (defined above), enable this field to fire DOs.
For all other type Digital Inputs, this is a read-only field, enabled, and unavailable for
modification.
Sense time
Select or enter a sense time. Enter a number between 0 and 64.
Digital Output
Device Menu
The Digital Output option opens the Digital Output Form that allows you to modify the records that are
automatically generated when you define a micro. You can configure, schedule, and control the state and
times of digital outputs.
Secure Perfect 6.1.1 User Manual 140
Digital Output Assignment
This dialog box allows you to select and assign digital outputs you want associated with the selected
record. Only digital outputs in the operators’ facilities are available for assignment by this operator.
• Select, and then click the right arrow to assign an available digital output.
• Select, and then click the left arrow to unassign a digital output.
Click OK to display results in the Digital Outputs windowpane.
Digital Output Group
Device Menu
The Digital Output Group option opens the Digital Output Group Form that allows you to assign digital
outputs into groups or sets for scheduling purposes. Example: To apply a schedule to a series of digital
outputs, apply the schedule to a group that contains the specific digital outputs.
Digital Output Group Assignment
This dialog box displays when you click Assign DO Groups, allowing you to select and assign DO groups
you want associated with the selected record. Only DO groups in the operators’ facilities are available for
assignment by this operator.
Select, and then click the right arrow to assign an available DO group.
Select, and then click the left arrow to unassign a DO group.
Click OK to display results in the Outputs Groups windowpane.
Digital Output Groups Tab
Access Right Form
This tab allows you to assign groups of digital outputs to access rights.
Assigned digital output groups: This windowpane displays a list of assigned output groups for the
current access right.
Assign Digital Output Groups: Click this button to display and assign digital output groups to the
selected access right. Only DO Groups that are related to the same micro as the readers selected in the
Access Right tab will be available for assignment. If no digital output groups display, verify that digital
output groups were set up on the Digital Output Group Form.
Digital Output Status
Operations Menu
The Digital Output Status option opens the Digital Output Status Form that displays the current status,
as found in the micro, for each DO (output) in the system.
Secure Perfect 6.1.1 User Manual 141
Digital Output Tab
Digital Input Form
This tab is available only if you have selected Digital Output in the Type field on the Digital Input Tab. Use
this tab to link digital outputs to a digital input. When this digital input is activated, the digital output is also
triggered.
Output A (Primary/Local: A primary input assignment is not required. The default is None. Click the
drop-down list to select an available DO to assign as the primary. If you select an output, this output must
belong to the local micro. If the micro is offline or unable to communicate with the host at the time of an
alarm, only the Primary/Local DO is triggered.
If the ON time on the Digital Output Form is set to 00, this DO will remain active until the digital input is
reset.
Output B:
Click the drop-down list to select an available DO. The digital outputs in this list can be on a local micro or
other micros. Output B will be activated only if the host is online and able to communicate with other
micros.
Digital Output Tab
Digital Output Form
Use this tab to schedule when the digital outputs in the group are in the active state and for the specified
length of time.
Micro
This is a read-only field. Displays the description of the micro on which this digital output is located.
Board
This is a read-only field. When the records are created, the default value is in the format: mmmm-b Board
Type where mmmm represents the micro number to which this reader is associated, b represents the
board number, and Board Type is the type of reader board, such as 16DO.
Example: 0001-1 16DO would be the digital output on micro one, 16DO board one.
Number
This is a read-only field. Displays the number of the digital output.
Active state
On/Off: Defines whether the digital output will be turned On or Off when the digital output is activated.
Contact your installer on how the digital output was wired. This determines the active state of the digital
output.
On time: Specifies the length of time the digital output will remain in the active state before going
inactive. This time may be overridden by the manual control buttons. If you enter 0 and this is:
• Output A, then the digital output will reset when the alarm resets.
• Output B, then the digital output will remain on until it is manually turned off or scheduled off.
When a micro is reset or the database is reloaded, all schedules from midnight to present time will run
EXCEPT for schedules that have a DO On time NOT equal to zero and were set to occur prior to the
current time. For example, you have created a schedule to occur at 8:00 am to turn a digital output into
the active state for 1 minute. At 10:00 am, the database for the micro is downloaded. During the
download process all schedules from Midnight to the current time (10:00 am) are re-run. Your schedule
for the DO will not run since it started and ended before the current time of 10:00 am.
Secure Perfect 6.1.1 User Manual 142
Digital Outputs Tab
Alarm Form
Use this tab to link digital outputs to an alarm. When this alarm is triggered, the linked digital output is
also triggered.
Output A (Primary/Local): A primary output assignment is not required. The default is None. Click the
drop-down list to select an available DO to assign as the primary. If you select an output, this output must
belong to the local micro. Because Output A is only on the local micro, it will communicate even when
offline. If the micro is offline or unable to communicate with the host at the time of an alarm, only the
Primary/Local DO is triggered.
If the ON time on the Digital Output Form is set to 00, this DO will remain active until the alarm is reset.
Example: A motion detector (digital input) senses movement in a restricted area and triggers a bell
(digital output). An alarm is generated.
Output B:
Click the drop-down list to select an available DO. The digital outputs in this list can be on a local micro or
other micros. Output B will be activated only if the host is online and able to communicate with other
micros. It will not communicate if offline.
Digital Video Recorder
Device Menu
The Digital Video Recorder option opens the Digital Video Recorder form that allows you to define,
configure, and request status of your DVR.
Digital Video Viewer
Operations Menu
The Digital Video Viewer menu item on the Operations menu opens a video command and control
application that allows you to monitor digital video multiplexers/recorders and their associated cameras,
control live video, as well as search and play back recorded video events.
The Digital Video Viewer application can also be accessed from the Secure Perfect toolbar by clicking
this icon:
Digital Video Viewer has its own Help system that details the features of the application.
DI History
Reports Menu
The DI History option opens the DI History Report Form that allows you to create a report based on the
history of digital input transactions in the system.
Disconnect Client
Select this icon to disconnect the selected client. This option also displays on the shortcut menu for this
form. The shortcut menu displays when you click the right mouse button.
Secure Perfect 6.1.1 User Manual 143
DO Board Records Creation
When you add a 16 DO board, sixteen (16) digital output records are created.
Example: 0001-1-01 DO
This digital output is on micro 1, board 1, point 1. To change this description, type over the existing text
and save the record. It is recommended that you keep the mmm-b-pp prefix in each digital output
description displayed to aid in locating the alarm points on the physical hardware. This field accepts a
maximum of 32 characters.
DO Groups Tab
Alarm Form
Use this tab to link digital output groups to an alarm. When this alarm is triggered, the linked digital output
groups are also triggered. The digital outputs will remain active until the alarm is reset, regardless of any
specified on-time setting for the DOs, unless it is the primary/local group.
• If it is the primary/local group, the DOs will follow their specified ON-time setting.
• If there is a reader in the primary/local group, the reader will follow the alarm state.
• If the DOs in the primary/local group are set to 0 for the ON time, that will force the DO to
follow the state of the alarm or input.
Be aware that Invalid Badge alarms and Lost Badge alarms do not reset. If you assign a DO Group to
either of these alarms, the alarm will go inactive or turn off when acknowledging or purging.
Output Groups: This windowpane displays assigned digital output groups. The digital output groups can
be on a local or other micro.
Assign DO Groups: Click to display a Digital Output Group Assignment dialog box, allowing you to
select and assign alarm DO groups that you want associated with this alarm record.
Primary/Local Output Group: The first local output group in the list of assigned output groups will
automatically display as the primary. You can select another output group as primary from the output
groups displayed in the windowpane. If the selection is not on a local micro, the assignment arrow button
is dimmed and unavailable for assignment as a primary output group. If the micro is offline or unable to
communicate with the host at the time of an alarm, only the Primary/Local DO group is triggered.
DO Groups Tab
Digital Input Form
Use this tab to link digital output groups to a Digital Input. When this Digital Input is triggered, the linked
digital output groups are also triggered. The digital outputs will remain active until the alarm is reset,
regardless of any specified on-time setting for the DOs, unless it is the primary/local group.
• If it is the primary/local group, the DOs will follow their specified ON-time setting.
• If there is a reader in the primary/local group, the reader will follow the Digital Input state.
• If the DOs in the primary/local group are set to 0 for the ON time, that will force the DO to
follow the state of the alarm or input.
Be aware that Invalid Badge alarms and Lost Badge alarms do not reset. If you assign a DO Group to
either of these alarms, the alarm will go inactive or turn off when acknowledging or purging.
Output Groups: This windowpane displays assigned digital output groups. The digital output groups can
be on a local or other micro.
Assign DO Groups: Click to display a Digital Output Group Assignment dialog box, allowing you to
select and assign alarm DO groups that you want associated with this DI record.
Primary/Local Output Group: The first local output group in the list of assigned output groups will
automatically display as the primary. You can select another output group as primary from the output
groups displayed in the windowpane. If the selection is not on a local micro, the assignment arrow button
is dimmed and unavailable for assignment as a primary output group. If the micro is offline or unable to
communicate with the host at the time of an alarm, only the Primary/Local DO group is triggered.
Secure Perfect 6.1.1 User Manual 144
Door Functions Tab
Reader Form
Use this tab to define the door settings associated with the selected reader.
Element Description
Time • Maximum unlock: The time interval in minutes and seconds that a door remains unlocked after
the reader reads a valid badge. This is the amount of time that a user has to open a door
based on a valid input.
1) Enter a number between 0 (minimum) and 60 (maximum) minutes.
2) Enter a number between 0 (minimum) and 59 (maximum) seconds.
Example: A facilities employee may be required to move equipment or furniture in and out of
rooms. The assignment requires a block of time beyond the normal unlock time as configured
and sufficient time to empty or fill rooms through which access is gained by a reader and valid
facility badge.
• Alarm sense: The time interval in minutes and seconds that a door can remain open (with a
valid badge read or an exit request). This time must always be greater than the maximum
unlock time.
1) Enter a number between 0 (minimum) and 62 minutes.
2) Enter a number between 0 (minimum) and 59 (maximum) seconds.
The Alarm sense time for the Reader and the DI Sense Time on the DI form are added
together to determine the total time that a door can remain open before the system triggers a
Door Held Open alarm.
• Extended unlock: The extended time interval in minutes and seconds that a door remains
unlocked after the reader reads a valid badge.
1) Enter a number between 0 (minimum) and 60 (maximum) minutes.
2) Enter a number between 0 (minimum) and 59 (maximum) seconds.
Example: If the door is used by handicapped persons or the reader is mounted at a distance
from the door, a longer unlock time may be required. If a 0 is entered in this field, the current
state of the reader is changed (or toggled) to its opposite state. The standard situation is the
first badge read causes the door to unlock and the next badge read toggles the door locked.
This time interval is also used if you selected Duration in the Lock On field below.
• Extended Alarm sense: This time interval is calcuated automatically and is a read-only entry.
The following illustrates time interval relationships:
The time intervals follow this formula:
extended alarm sense = alarm sense + extended unlock – maximum unlock
Door Lock
Once the door is unlocked, this field allows you to specify when the door should relock.
On
• Close: With this option, when the door is closed, the door lock will lock immediately regardless
of the Maximum Unlock Time (Maximum unlock field above) and the Alarm Sense Time
(Alarm sense field above) is reset to zero.
• Open: With this option, when the door is opened, the Maximum Unlock Time (Maximum
unlock field above) is set to zero and the door lock will lock. When the door is closed at any
time during this process, the Alarm Sense Time (Alarm sense field above) is reset to zero.
• Duration: With this option, after the Maximum Unlock Time (Maximum unlock field above)
expires, the door will lock when closed and the Alarm Sense Time is reset to zero. During the
Maximum Unlock Time, the state of the door does not affect the Maximum Unlock Time or the
Alarm Sense Time.
Secure Perfect 6.1.1 User Manual 145
• Open: Enable if the Exit Request button is wired as open for an exit request.
Request to
• Closed: Enable if the Exit Request button is wired as closed for an exit request.
exit (REX)
• Unlocks door: Select this checkbox if you want the door to unlock when an exit request button
is pushed.
• Follows extended unlock: Select this checkbox if you want this REX to follow the time limits as
configured for ‘Extended unlock.’
Extended
Select an output from the drop-down list of available Digital Output points. This output follows
Auxilary
the Extended unlock time configurations and must be on the same micro as this reader.
Digital
Output
Link to this
Use this field to link this reader to another reader on the same micro. Select a reader from the
reader
drop-down list.
Download Badges
Downloading includes the badge database records for that micro. This option forces a badge download
even if the micro is not configured for forced badge downloading. The badge download will not
automatically take place when the micro is placed online. You must initiate the download to send all
necessary badges to the selected micro.
Clicking this icon from the Micro Utility Form toolbar will access this option:
Download Database
You may select more than one micro for a database download. All downloads happen simultaneously
without affecting the micro’s ability to process badge and alarm transactions.
Downloading a database does not download badges. If a new micro database is required, you must
click the Download Database icon as well as the Download Badges icon for this micro.
Clicking this icon from the Micro Utility Form toolbar will access this option:
DVR
Reference Topic:
DVR Disk is Full
Digital Video Recorder (DVR): A generic reference to CCTV equipment that can provide digital video
multiplexing and/or recording.
The Digital Video Viewer system program, accessible from the Operations menu, allows you to monitor
and control video for multiple DVRs and their associated cameras. Digital Video Viewer can also be
accessed on the Secure Perfect toolbar by clicking this icon from the toolbar:
On the Digital Video Viewer window, click Help for additional information about the program.
Refer to the User Manual of your DVR for specific installation, configuration, and operation instructions.
DVR Disk is Full
This warning notification may display when the DVR internal disk for storing video is reaching its full
capacity. Refer to the DVR User Manual for specific information on configuring disk management options.
Secure Perfect 6.1.1 User Manual 146
DVR Help
Welcome to Digital Video Viewer Help!
The Digital Video Viewer program allows you to monitor digital video multiplexers/recorders and their
associated cameras; control live video; and search and playback recorded video events. Operators must
be assigned to the specific facility and have Digital Video Viewer full permission for all forms.
Related Topics:
Moving the Window
Digital Video Viewer
DVR Help - Boxes and Properties
60D File Extension
This is a Kalatel-specific file extension and is the default format.
Advantages:
1. The camera number and time labels are included with the images.
2. A 60D file is unalterable video and can be used for police work. If the file was recorded while
playing recorded video, chain of custody is preserved. Chain of custody is the process of tracking
and validating a video back to its source.
Admissible chain of custody files MUST be recorded by a Kalatel DVR, THEN saved as a
.60D file.
3. You can play back 60D video in Secure Perfect and Wavereader.
AVI File Extension
AVI (Audio Video Interleave) is the most common compression technique used to encode audiovisual
information for personal computers.
1. Video recorded in AVI format does not have a date and time label.
2. You cannot play back an AVI file through the Secure Perfect application. You must use an
external application such as Windows Media Player.
3. AVI files are not acceptable in a court of law.
Microsoft developed the AVI format. It is a common format on computers, and comes with the Windows
operating system as part of the "Video for Windows (VfW)" distribution. The format is interleaved such
that video and audio data are stored consecutively in an AVI file (that is, a segment of video data is
immediately followed by a segment of audio data). AVI is highly dependent on the type of hardware used
in the playback of images.
• A 386-based machine can only play back small, 160 by 120 pixel, 256 color images.
• A 486 machine can handle images up to 320 by 240 pixel (a quarter of a low-resolution
screen).
• Using a Pentium chip with an accelerator graphics cards it is now possible to provide full
screen (640 by 480 pixel) low resolution moving images.
DVR Help - Call Preset Button
Right-click a preset icon to display the Call Preset shortcut. Select Call Preset to call the camera to the
preset position and automatically open a live video window of the camera, if not already opened.
Secure Perfect 6.1.1 User Manual 147
DVR Help - Camera Shortcut Menu
Right-click on a selected camera icon to display the camera shortcut button.
• Select View Live to call up a live video window for that camera.
• Select Edit to display the Camera Form, and depending on your permissions, view or edit the
camera configuration.
DVR Help - Digital Video Search Icon
Digital Video Viewer Window
Click to launch the Digital Video Search window. Digital Video Search is used to search for recorded
video events triggered by reader and/or alarm transactions. Click this icon to close the Digital Video
Search window.
Digital Video Search has a separate Help system. Refer to Digital Video Search Help for specific details
on how to search for recorded video events. Activate the Help system by clicking Help on the Digital
Video Search window.
DVR Help - Digital Video Viewer Window
The main Digital Video Viewer program window consists of the following:
Digital Video Network List
The Digital Video Network List is an expanding hierarchical display of your digital video network devices
as defined in the system database. These devices include host computers, DVRs, cameras, and presets.
The Digital Video Network List also acts as a system monitor for its devices, providing graphical display
of device conditions and status changes.
Click the Show me icon to view a step-by-step animated demo.
Failed Host Computer
In case of a system failure on a client computer licensed for Client Redundancy, a backup client takes
over the functionality of DVRs and cameras. This scenario will be indicated by the backup computer
name in parentheses following the failed Hostname, such as: BCTBOCA <BCTROME>
where
• BCTBOCA is the failed host computer.
• <BCTROME> is the backup client. DVRs previously associated and displayed under BCTBOCA will
display under (BCTROME). No DVRs will display under the failed client.
Following recovery, devices again display under the default hostname. The backup client name may
display in the list with no device association.
Play Controls
Shortcut menus for operations of DVR and cameras can be accessed quickly using right-click mouse
button navigation.
The play controls allow you to control and adjust live and recorded video.
Secure Perfect 6.1.1 User Manual 148
Setup Record Video
The selections in this grouping are available only when a video window is open and a video is not
currently recording.
The setup allows you to save a permanent recording of a video segment from live or prerecorded
video, as displayed in the video window. You cannot assign a second setup until the current recording
is finished and a file name is assigned. However, you can open a second video window, configure
setup parameters, and begin recording on the new video window. When you close a video window,
the Setup Record Video options become unavailable and the recording stops.
File Format: Select the format you will use to save this video recording, from the drop-down list. You
can save this recording as 60D or AVI. The default is 60D.
Recorded File Name: This dialog box displays the default location and file name to which this video
will record.
Start Recording: This button becomes available when a video window is opened. Click
to begin
recording. While the recording is in progress, this button label changes to Stop Recording.
Play Recorded: This option is available for 60d files only. When you click
to play previously
recorded video, a window displays, allowing you to navigate to a video file and begin playing the selected
video. While a recording is playing, you can select and play additional recordings.
Create SP AutoPlay CD: This option is available for 60d files only. Click
to launch an SP AutoPlay
CD Creator window that allows you to create a CD from a video file.
Digital Video Search Icon
Click the Digital Video Search icon to display and enable the DVR Search window. Refer to the DVR
Search Help system for details and options of the Search Window.
Help: Click to activate the DVR Help system that provides details and options of fields and buttons
on the Digital Video Viewer window.
Status
The text dialog at the bottom of this Digital Video Viewer window displays the current status of the
currently selected device.
Secure Perfect 6.1.1 User Manual 149
DVR Help - DVR Shortcut Menu
Right-click on a selected DVR icon to display the shortcut menu options:
• Select Online to initiate a connection between the host computer and the DVR. The DVR will be
monitored; event triggers will be processed; and video can be accessed.
Click the Show me icon to view a step-by-step animated demo.
• Select Offline to disconnect the host computer from the DVR. The DVR will not be monitored;
event triggers will not be processed; and video cannot be accessed.
• Start Recording forces a DVR into record mode if it is presently out of record mode.
• Stop Recording forces the DVR out of record mode. Live video cannot be accessed and event
triggers cannot be processed if the DVR is not in record mode.
• Select Edit to display the Digital Video Recorder Form, and depending on your permissions,
view or edit the DVR configuration.
DVR Help - Moving the Window
Related Topic:
Video Windows - An Overview
The Digital Video Viewer program window can be independently moved anywhere on the desktop and
the position saved.
• Move a Window
Left-click the title bar of any window and drag to desired position of your desktop.
• Save Position
Point and right-click in data box or button panel background to display and select Save Position
shortcut.
When you exit and re-launch the Digital Video Viewer program, the window will display at the saved
position.
Secure Perfect 6.1.1 User Manual 150
DVR Help - Play Controls - Digital Video Viewer
The play controls allow you to control and adjust live video and playback of recorded video. The controls
affect all active video windows on the same DVR. The functions of the buttons are as follows:
Play Forward
Play Reverse
Fast Forward
Fast Rewind
Single Frame Advance
Single Frame Reverse
Stop
Pause
Play Speed adjusts the playback speed of recorded video. The DVR playback speed
can be adjusted by this slide option from minimum to maximum speed. This option is available only when
a search option is selected or playback of recorded video is activated.
Adjust playback of live video from a PTZ camera with the following controls:
Focus: Click to increase the sharpness of the image from the live camera display.
Focus: Click to decrease the sharpness of the image from the live camera display.
Iris: Click to allow more light to fall on the image-sensing device, appearing to increase the light of
the live camera display.
Iris: Click to close down or decrease the light falling on the image-sensing device. Sufficient light is
maintained and controlled for the live camera display.
Secure Perfect 6.1.1 User Manual 151
DVR Help - Recorded File Name
A 60D file name may display similar to the following:
c:\Program Files\GE Interlogix\Secure Perfect\Video\170-01 Camera
12_5_2003_4_04_30.60D
(If this is a custom installation and the file shares were separated from the Secure Perfect Application, the
default video folder resides on the File Server.) If you choose to store the video in another location, click
to browse and navigate to another location. You can assign additional alphanumeric characters to
the video file name to assist in identification. If the Location dialog box has a file name from a previous
recording, you will need to change this file name to avoid overwriting a previous recording. The following
characters are NOT permissible as part of a file name:
/ \ ? * < > | "
DVR Help - SP AutoPlay CD Creator
This window displays a list of previously recorded 60d files, recorded from a DVR. By default, the Video
folder of your Secure Perfect application displays. If video clips are stored in another folder, navigate to
that folder to display the video file names.
If you choose to record a video clip, performance will be compromised. If you have other surveillance
windows open, close them. You may want to continue surveillance at another computer while the video is
recording to CD.
If you have a recordable drive and Roxio
Direct CD software:
1. Double-click the file name of the video you are going to record.
2. Verify the path.
3. Verify the naming convention of the video.
4. Verify the recording drive and device.
5. Click
to begin recording. The button displays red while recording. If you want to stop the
recording in progress, click the red button.
6. Follow the directions and prompts as they display in the popup windows.
GE Security uses only Roxio Direct CD software. If you purchased your system from GE Security,
Roxio software was provided for you.
DVR Help - Video Window On-Screen PTZ Control
Camera(s) with pan, tilt, and zoom capability can be manually controlled on screen from within a live
video window by use of the mouse. When placing your mouse pointer within a live video window of a PTZ
camera, the mouse pointer changes to a four-point star.
• Center the mouse pointer, left-click, and hold for pan and tilt function (the pointer changes to
P/T).
• Drag left or right to pan; release the left mouse button to stop.
• Drag up or down to tilt; release the left mouse button to stop.
• Center the mouse pointer, right-click, and hold for zoom function (the pointer changes to Z).
• Drag up or down to zoom; release the right mouse button to stop.
• Left-click (the pointer changes to P/T) and drag to the right to pan right.
• When using on-screen PTZ control, it is helpful to start from the center position of the live video
window and initiate mouse control commands in short, smooth movements.
Secure Perfect 6.1.1 User Manual 152
DVR Search
Related Topics:
SP Events Tab
General Events Tab
General Playback Tab
Motion Tab
Video Windows - An Overview
Play Controls - Digital Video Viewer
Welcome to DVR Search!
The DVR Search window opens with the SP Events Tab displayed and can be independently moved
anywhere on the desktop. The window can be closed and reopened by clicking the Search icon on the
Digital Video Viewer window.
Move a Window
Left-click the title bar of any window and drag to desired position of your desktop.
Save Position
Point and right-click anywhere on the window and select Save Position shortcut. When you exit and
re-launch the DVR Search program, the window will display at the saved position. Each tab of this
form offers a unique type of search.
DVR Search - Alarms Button
Click Alarms to display an Edit Alarms List form. This form displays a list of available alarms that can be
selected and assigned as search criteria for recorded video event tags.
Select and then close the Edit Alarms List form. The assigned alarms will display in the Event Sources,
Alarm list window.
DVR Search - Cameras Button
Click Cameras to display an Edit Camera List assignment form. Only cameras belonging to DVMRs
associated with facilities available for assignment by this operator, will display. Select those cameras you
want to display in the camera list box.
DVR Search - Clear Button
Click Clear to clear the search criteria and results displayed. The window clears and the form returns to
default state.
While a search is in progress, this button label changes to Stop Search. The search can be terminated by
clicking Stop Search. When the search terminates, the button label again reads Clear.
Secure Perfect 6.1.1 User Manual 153
DVR Search - Event Tag
This dialog box allows you to enter Event Tag text, to contribute to the search of video in the Secure
Perfect database. This dialog box accepts up to 50 alphanumeric characters. A search by Event Tag
does not require a selection of Readers or Alarms.
DVR Search - General DVMR Events
Related Topic:
Video Windows - An Overview
General Events Tab
Click the Show me icon to view a step-by-step animated demo.
A General Events search allows you to search alarms and events on the hard drive of the DVR.
A database search of General Events is not available without entering a DVR Source.
DVR Source
Select a DVR from the drop-down list. Only DVRs associated with facilities available for assignment by
this operator will display.
Search Range Calendar Entries
Select the check box on the left to make available the calendar entries. The calendar displays with the
current date and time as defaults. Establish the parameters of a video search:
• Click a calendar day to start the search and a day to end the search.
• Enter a start time and end time in the list boxes or accept the defaults.
This instruction begins the recall of video recording from the closest point to the time and date selected.
Click Search to display the results of parameters in the search results windowpane or continue to set
additional parameters.
Search Criteria
Cameras: Select the checkbox to enable/disable search criteria by camera. Click Cameras to display an
Edit Camera List assignment form. Select those cameras available for assignment by this operator that
you want to display in the camera windowpane. When the camera assignment form closes, the selected
cameras display in the camera windowpane.
Text: This is the default search criteria type. When Text is selected, the text content box becomes
available and accommodates the entry of a maximum of 50 alphanumeric characters. The asterisk (*) can
be used as a wildcard entry.
Alarm or Event: Change the type to camera Alarm or Event to search for alarms or events.
Search: Click Search to begin the recall of video based on the date/time and/or search criteria.
A search cannot be performed if recorded video is currently playing on the selected DVR.
While the search is in progress:
• The Search button is unavailable.
• Click Stop Search to discontinue the search in progress. If you do not discontinue, the search
will progress until all records matching the search criteria have been found. When a search is
ended, the Stop Search button changes state and is now a Clear button.
• A statement displays indicating the number of records found. A flashlight icon indicates a
search is in progress.
• Results are displayed in the Search Results windowpane.
• Live video will play during a search.
• Recorded video on the same DVR cannot play during a search
Secure Perfect 6.1.1 User Manual 154
• A search will terminate if the DVR goes into error.
• If the search generates no records, a No Video Found dialog box will display.
Search results can be sorted by clicking the column header in the Search Results windowpane; however,
recorded video cannot be initiated during a sort. Select an entry, right-click, and select Play to begin the
playback of the associated recorded video. Playback of individual recorded video is limited to a single
recall instance per DVR. If you are unable to access a recorded video, a cautionary message will display.
It may be that the recorded video on the same DVR is presently being accessed or the recorded video
event has been overwritten and is no longer present in the DVR.
Click Clear to clear the search results displayed and return the form to default state. The search results
window clears.
Click Help to activate the Digital Video Search Help system.
DVR Search - General Playback
General Playback Tab
Related Topic:
Video Windows - An Overview
Parameters set on this form search and retrieve video from the hard drive of the DVR. Playback
parameters selected here continue indefinitely until you choose to discontinue the playback.
Click the Show me icon to view a step-by-step animated demo.
Search on Date and Time
The calendar displays with the current date, and the current time displays in the time list box. Establish
the beginning parameter of a search by date and time. This instruction begins the recall of video
recording from the closest point to the time and date selected.
Search Source
Select a DVMR from the drop-down list. Only DVMRs associated with facilities available for assignment
by this operator will display.
Click Cameras to display an Edit Camera List assignment form. Select those cameras you want to
display in the camera windowpane. When the camera assignment form closes, the selected cameras
display in the camera windowpane.
Click Play to begin playing the associated recorded video. Playback of individual recorded video is limited
to a single recall instance per DVR. If you are unable to access a recorded video, a cautionary message
will display. It may be that the recorded video on the same DVR is presently being accessed, or the
recorded video event has been overwritten and is no longer present in the DVR.
Click Clear to clear the search criteria and results displayed. The search results window clears.
Click Help to open the Digital Video Search Help system.
Secure Perfect 6.1.1 User Manual 155
DVR Search - Grabbing Motion Video Clips
When grabbing a video image from a selected camera, keep in the mind the following:
1. If a camera is currently recording live video, the motion grid grabs a still image of what is
currently playing on that camera.
2. If a video window is displaying previously recorded video, the motion grid will be populated with
a clip from the recorded video that is presently displaying in the window.
3. If two video windows are in progress from the same camera, one is live video, and the other is
previously recorded video, the grid grabs a still image from the live video.
4. If no video window is currently open, the system starts the selected camera if it is online, opens
a live video window, grabs an image, and displays a frozen image in the grid.
5. If the camera is a PTZ type, the video window opens and the system grabs a still image of
whatever is in focus at that moment.
6. If you want to display video for a specific preset area of a PTZ type camera, it is recommended
that you conduct a preliminary search on the SP Events tab or General Events tab before setting
your parameters on the Motion tab.
DVR Search - Help Button
Click Help to open the Digital Video Search Help system.
DVR Search - Motion
Motion Tab
Reference Topic:
Grabbing Motion Video Clips
Parameters set on this tab allow you to select a specific area of the image displayed on the grid. The
image was grabbed from live or previously recorded video. A search of the DVR hard drive is generated
based on the selected criteria.
Click the Show me icon to view a step-by-step animated video.
DVR and Camera Source
You must select a DVR and a camera in order for the Search feature to become available.
• DVR: Select a DVR from the drop-down list of online DVRs. Only online triplex DVRs
associated with facilities available for assignment by this operator will display.
• Camera: Select an online camera from the drop-down list of cameras belonging to the
selected DVR. The grid immediately fills with an image grabbed from that camera. The image
may take a moment to freeze. If the camera is not online, the grid remains blank and no
image displays.
OPTIONAL: Search Range Calendar Entries
The calendar displays with the current date and time as defaults. The calendar is a way to establish the
parameters of a video search:
• Click a calendar day to start the search and a day to end the search.
• Enter a time in the start time and end time list box or accept the defaults.
This instruction begins the recall of video recording from the closest point to the date and time selected.
Secure Perfect 6.1.1 User Manual 156
Grid: When a camera is selected, a snapshot image is grabbed from the live video that is the focus of the
camera or from previously recorded video of that camera. The snapshot image is displayed in the grid.
Verify that the date/time caption at the top of the grid matches your request. By default, the grid displays
with rows of red cells. A portion of the image that is displayed in the grid window can be selected as a
way of narrowing the focus of the search.
Brush Size
The options below define a method of selecting a portion of the grid that will be the focus of the search
criteria. Left-click your mouse pointer within a cell; do not click between cells to select. The grid consists
of red cells that turn green when selected, or toggle from green to red, switching a mode on or off:
• Single Cell: Select Single Cell, then move your mouse pointer over the grid and left-click a
cell. The single cell turns from red to green and the area within the selected cell is the focus of
the search criteria.
• Row: Select Row, then move your mouse over the grid and left-click a cell. The entire row of
cells turns from red to green and the area within the selected cells is the focus of the search
criteria.
• Column: Select Column, then move your mouse pointer over the grid and left-click a cell. The
column of cells turns from red to green and the area within the selected cells is the focus of
the search criteria.
• 3 x 3: Select 3 x 3, then move your mouse pointer over the grid and left-click a cell. The cell,
as well as all cells surrounding the cell, turns from red to green. The selected area is a total of
nine cells that turn from red to green and the area within the selected cells is the focus of the
search criteria.
The selections are toggle selections. That is, one click selects and the second click clears the
selection. If a row of cells is selected followed by a column selection on the same window that
intersects the selected row, the cell at the point of intersection will clear.
: Click to select all cells in the grid. All selected cells display in green.
: Click to clear all selected cells in the grid. All cleared cells display in red.
• Click Search to begin the recall of video based on the date and time search criteria.
The Search Results windowpane returns a list of recorded video based on the parameters
and criteria specified. The Search Results windowpane is divided into columns labeled :
Sequence, Start Date/Time, End Date/Time, Camera, Type, and Text. Select the desired
Sequence and right-click to play the recorded video event. Playback of individual recorded
video is limited to one recall instance per DVR. If you are unable to access a recorded video
event, a cautionary message will display. It may be that the recorded video on the same DVR
is presently being accessed or the recorded video event has been overwritten and is no
longer present in the DVR.
• Click Clear to clear the selected search criteria and search results windowpanes.
• Click Help to activate the Digital Video Search Help system.
DVR Search - Play Button
Click Play Event to begin playing the associated recorded video for a selected entry on the search
results windowpane.
DVR Search - Readers Button
Click Readers to display an Edit Readers List form. This form displays a list of available readers that can
be selected and assigned as search criteria for recorded video event tags.
Select and then close the Edit Readers List form. The assigned readers will display in the Event Sources,
Secure Perfect 6.1.1 User Manual 157
Readers list window.
DVR Search - Search Button
Click Search to begin the search and recall of video on the DVR hard drive for the recorded video tags
that meet the selected and assigned search criteria. The results are displayed in the search results
window.
DVR Search - SP Events
Related Topic:
Video Windows - An Overview
SP Events Tab
DVR Search opens with the SP Events tab displayed.
Select the check box on the left to make available the Search button. In order to search the database
for existing records, enter an applicable date/time range and/or event source parameters.
Search Range Calendar Entries
The calendar displays with the current date and time as defaults. Establish the parameters of a video
search:
• Click a calendar day to start the search and a day to end the search.
• Enter a time in the start time and end time list box or accept the defaults.
This instruction begins the recall of video recording from the closest point to the time and date selected.
Click Search to display the results of parameters in the search results windowpane or continue to set
additional parameters.
Event Sources and Search Results
Narrow your search further by assigning additional parameters. This window displays options to search
for a recorded video sequence OR tagged event.
• Click Readers or Alarms and Intrusion DIs to display a selection of devices and Intrusion type
digital inputs from which to search and display recorded data. If the reader or alarm
description has changed, request a search based on the old description.
• You can also enter identifying text in the Event Tag dialog box to contribute to the search. A
search by Event Tag does not require a selection of Readers or Alarms.
Click Search. Only readers and alarms associated with facilities available for assignment by this operator,
and assigned to event triggers using the Event Trigger Form, will be displayed.
Secure Perfect 6.1.1 User Manual 158
`
The Search Results windowpane returns a list of recorded video event tags based on the parameter
criteria specified. The Search Results windowpane is divided into columns labeled : Sequence, Event
Tag, Camera Number, DVR, Date/Time, and Event Tag. Select the desired event tag and right-click to
display a shortcut menu.
• Select Play Event for playback of individual recorded video events, limited to one recall
instance per DVR.
• Select Play Single Recorded Frame to display the first frame of the event recording as a still
photo.
If you are unable to access a recorded video event, a cautionary message will display. It may be
that the recorded video on the same DVR is presently being accessed or the recorded video event
has been overwritten and is no longer present in the DVR.
Click Clear to clear the selected search criteria and search results windowpanes.
Click Help to activate the Digital Video Search Help system.
DVR Search - Stop Search
Click Stop Search to discontinue the search in progress. If you do not discontinue, the search will
progress until all records matching the search criteria have been found.
Secure Perfect 6.1.1 User Manual 159
E
Edit Alarm Group
This dialog box allows you to add or edit the link between an event and an alarm group. The event
determines when the alarm changes to the selected alarm group.
Event: Click the drop-down list to display available events from which to select.
New Group: Click the drop-down list to display available alarm groups from which to select.
Edit Icon
Click this graphic to open the Micro Form and edit the settings for the selected micro:
Edit Sense Time
Event: Select an event from the drop-down list. If there are no events listed, you will need to configure
events using the Event Schedule Form.
New time: Select or enter a sense time. The value is in seconds and indicates the delay before triggering
an associated digital output or sending in a Secure Perfect alarm if the DI type is Alarm. This number tells
the system how many seconds to wait after sensing the input has changed to Active State. Enter 00 to
immediately send the transaction to the host, notifying the host of a state change. Increase the Sense
Time entry if using noisy or chattering contacts.
Example: This value could indicate the delay time, in seconds, that elapses between the time a door
contact is broken and the time the output and alarm are triggered. If door contact is closed before the
sense time elapses, the alarm would not come in to Secure Perfect and the output would not activate.
Elevator
Device Menu
The Elevator option opens the Elevator Form that allows you to configure elevator control records.
Elevator Assignment
This window displays when you click Assign Elevators, enabling you to select and assign an elevator
association for this form. Only elevators in the operators’ facilities are available for assignment by this
operator.
• Select, and then click the right arrow to assign an available elevator.
• Select, and then click the left arrow to unassign an elevator.
The elevators that display in this list are those that are configured on the Elevator Form.
Secure Perfect 6.1.1 User Manual 160
Elevator Tab
Elevator Form
Select this tab to create or edit elevator information.
Reader
To tag a reader as an elevator reader, select a reader from the drop-down list of available readers. If no
readers are listed, check that the readers have been marked active on the Reader tab of the Reader
Form.
Floor Tracking
Select one of three options:
• No Floor Tracking: Floor(s) selected are not sent to Badge History (not tracked).
• Floor Tracking by Input: The floor(s) selected are sent to Badge History.
• Floor Tracking by Keypad: Floor selection is made by using the keypad of the reader and
the floor(s) selected are sent to Badge History.
Do not switch between floor tracking and no floor tracking in the same elevator record. If you want to
change an existing record, delete that record and create a new one with the desired floor tracking
method.
Interface
Select one of two options:
• Trigger All DOs prior to floor selection: All the appropriate floor selection buttons activate.
The user can select one or more floors.
• Trigger One DO upon floor selection: All the appropriate floor selection buttons activate.
The user can select only one floor.
Event Schedule
Administration Menu
The Event Schedule option opens the Event Schedule Form that allows you to define the time and day
of the week on which a device state will change, such as resetting an anti-passback status for entering
and leaving a building.
Secure Perfect 6.1.1 User Manual 161
Event Schedules Tab
Reference Topics:
Events Tab
Reader Type Events Tab
Event Schedule Form
Use this tab to create an event. Events are not partitioned by facilities. If you need to use facilities in your
system, create an event for each facility. Use the facility description as a prefix on the Event Schedule
Form, Description to indicate to which facility this event will apply.
Example: BocaHQ Weekend Begins would indicate a facility-specific event schedule, where BocaHQ
refers to a geographic location. For example, you could create an event beginning each Friday at 6:00
P.M. that resets the APB status and the T&A status, and sets a reader to Badge and Keypad. Employees
coming into the building after 6 P.M. on Friday will be required to present their badge and then key in a
PIN number to enter the building. Remember that an event will stay in effect until another event occurs to
change it. Therefore, in our example, a second event will need to be scheduled to change that reader
back to Normal on Monday morning.
The time 24:00 is the same as 00:00 of the next day. For example, Friday at 24:00 is the same as
Saturday at 00:00.
• Time chart: Click your mouse pointer on the time and day of the week/mode. This creates a
diamond that indicates that the event will occur at that time and that day of the week/mode.
Note that the current event’s diamond is selected. Time is displayed in half-hour increments
by default. To change the display increment, click and hold the left mouse button on the right
end of the bottom time bar then move the cursor to the left until you are at the desired time
increment. Then, click the desired time. If the point is incorrectly located, you can drag and
drop the point to the exact location you want.
• Event: Displays the number of the event. The numbers start with one for the first event and
increment consecutively for each event thereafter.
• New: Click to create a new event. The Secure Perfect application does not use these
additional points at this time.
• Delete: Click to delete an event. You can delete a schedule that is currently in effect. The
Delete button will remove the most recent point you have created. If you continue to click
Delete, additional calendar points will disappear in the order they were created. Deleting a
schedule does not affect the current state of any devices to which this schedule is
associated. Any devices currently under the effect of the deleted schedule will remain in that
state until changed manually or by another event schedule.
Event details
The controls in this section are not needed in most circumstances. Use details to verify that your
selections match the calendar display.
• Event time: Displays the time at which the event will occur.
• Mode/day: Displays the mode or day on which the event will occur.
You will need to assign this event schedule to a device such as a micro (see Micro Form, Events tab)
or a reader (see the Reader Form, Reader Type Events tab).
Event Trigger
Administration Menu
Select Event Trigger to open the Event Trigger Form that allows you to associate cameras, presets,
reader transactions, and alarm transactions for creating event-driven video response. An event consists
of a camera and either readers or alarms.
Secure Perfect 6.1.1 User Manual 162
Events Tab
Alarm Form
Use this tab to assign events for alarm groups and alarm sense times. Events define start time(s) and
day(s) only. There is no end associated with an event. Therefore, that event will stay in effect until
another event changes it or you change it manually.
• Alarm group: This windowpane displays assigned events and their associated alarm groups.
• Edit: This button will be available only if you currently have a list of assigned events and
alarm groups. An Edit Alarm Group dialog box displays and allows you to modify the
selection of events and associated alarm groups.
• Add: Click ADD to assign events to the specified alarm group. An Edit Alarm Group dialog
box displays enabling you to build a list of events and associated alarm groups.
• Remove: Select an entry in the list of displayed events, then click Remove to remove from
the list.
Events Tab
Alarm Group Form
Use this tab to schedule changes to the sense time on all alarms in the group by assigning previously
defined events to alarm groups.
Alarm sense time events
This windowpane displays the currently assigned events and their associated sense time.
• Edit: Will be available only if there are currently assigned alarm sense time events. This
button is used to modify existing alarm sense time events. The Alarm Sense Time form
displays.
• Add: Click Add to assign events to the specified sense time. The Alarm Sense Time form
displays.
• Remove: Select an alarm sense time event to remove and click.
Events Tab
Digital Input Form
This tab is unavailable for input if the Type of Digital Input is Intrusion.
Use this tab to assign events and an associated sense time to this digital input. Events define start
time(s) and day(s) only. There is no end associated with an event. Therefore, that event will stay in effect
until another event changes it or you change it manually. Click Search to display a list of existing event
records associated with this digital input.
Sense Time
This windowpane displays which events change the sense time. You can also assign events and sense
times to this digital input.
• Edit: This button will be available only if there are currently assigned sense time events.
Click this button to display the Edit Sense Time dialog box. From here, you can assign an
event and sense time or modify the existing sense time assignment.
• Add: To add events to the list, select an event and click. The Edit Sense Time dialog box
displays. Assign an event and sense time.
• Remove: To remove events from the list, select an event and click.
Secure Perfect 6.1.1 User Manual 163
Events Tab - Micro Form
Micro Form
Use this tab to assign events to this micro.
Reset APB Event
Select an event from the drop-down list of available event records that will reset the anti-passback status
for all badges in the micro.
Reset T & A Event
Select an event from the drop-down list of available event records that will reset the T&A status for all
badges in the micro.
Exchange Key Encryption
Exchange encryption protects the Host-to-micro exchange of information. Assigning an exchange key
grants you a privilege of accessing the next level of encryption, the Data Encryption. You have two
options:
• System: This method of encryption is more convenient but more vulnerable. The key is set at
the factory, system-generated, and exists in the Host software.
• Custom: Setting up a Custom exchange key is the most secure method of encryption. The
Custom key is user-supplied. The installer can go to each micro and assign the exchange
key. When assigning a Custom exchange key, you must assign a total of 48 unique hex
characters, in three 16-character strings. Do not repeat any characters. This method of
encryption uses a three-pass authentication process. Starting at the left, the first pass
authenticates 16 hex characters. The second pass authenticates 16 hex characters. The
third pass authenticates all 48 hex characters.
Exit
Refer to Log On/Log Off or Shut Down.
Expiration Date Filter Tab
Badge Report
Use this tab to generate a report based on the expiration date of the badges.
• Do not filter badges by expiration date: Select this field if you do not want to use the
expiration date as a method of filtering the report information. This is equivalent to running a
report on badges for all expiration dates.
• Filter badges using this expiration date range: Select this field if you do want to use the
expiration date as a method of filtering the report information. If this is selected, you must
select a starting and ending date.
• Starting date: Click the start date you want for the starting range of expiration dates.
• Ending date: Click the ending date you want for the ending range of expiration dates.
Secure Perfect 6.1.1 User Manual 164
Export
File Menu
This option is available only when a Report Form is displaying. The Export option allows you to select an
export format for your report. There are a variety of formats available including text, Word for Windows,
Lotus, HTML, and Excel. Select an export destination for the report to a disk file, exchange folder, Lotus
Domino, Lotus Domino Mail, or Microsoft Mail (MAPI).
Click the Show me icon to view a step-by-step animated demo.
External Reports
Reports Menu
The External Reports option opens a Launch External Reports dialog that allows you to select an
executable program or report that was not created within SP. For example, you can access reports you
created using a third party report generator such as Crystal Reports or Microsoft Access 2002.
Secure Perfect 6.1.1 User Manual 165
F
Facilities Tab
Operator Form
Use this tab to assign facilities to an operator.
• Assigned Facilities: This list displays the facilities assigned to the current operator.
• Assign Facilities : Click to display the Facility Assignment dialog box that allows you to assign
facilities to this operator.
Facility
Administration Menu
The Facility option opens the Facility Form that allows you to label your facilities, related records, or
groupings of records. If Facilities are going to be used, the Facilities must first be defined in SP, on the
Facility Form.
Secure Perfect 6.1.1 User Manual 166
Facility
Reference Topics:
Facility Form
Operator Form
Permissions Form
Definition
The Secure Perfect database can be partitioned and grouped. These groupings are identified as
Facilities. If Facilities are not defined, all operators will be able to access all the Secure Perfect records,
based on the permissions associated with the form.
Reminders:
• Facility partitioning does not involve access rights or who goes where.
• The same facility is assigned for all devices associated with the micro when a micro is
created.
• Reports can be generated based on the currently active facility or all facilities assigned to the
current operator.
• GLOBAL EDITION SYSTEMS: To view transactions outside of your region, you must have in
your active facility, the client’s facility where the transactions are occurring.
Sequence Guide:
1. If Facilities are going to be used, the Facilities must first be defined in SP, on the Facility Form.
When creating a Facility record, enter a description that uniquely identifies the location or function
of the facility.
2. Permissions are created and defined to determine what form and what fields will be available within
Secure Perfect.
The forms in Secure Perfect will display an icon in the left corner indicating the permissions
assigned to the current operator. The form icons correspond to the icons and permissions assigned
on the Permission Form.
3. Once defined, facilities and permissions are available for assignment to an operator on the
Operator Form.
a) At any given time, the current operator has the ability to select the active facility for that session,
from the list of all facilities that the current operator is allowed to see.
b) When a facility is assigned to an operator, it will display in the Facility drop-down list of Secure
Perfect forms after a successful login by that operator. Depending on assigned permissions, that
operator can now create records and assign facilities from the list that displays in the Facility drop-
down list.
Facility Assignment Dialog Box
This dialog box lists the facilities available for assignment to this particular operator.
• Facilities can be moved to the Assigned list by selecting and clicking the appropriate arrow.
• Facilities can be removed from the Assigned list by selecting and clicking the appropriate
arrow.
Facility Tab
Facility Form
Use the field on this tab to create facility records.
Description
Enter a description that uniquely identifies location or function of the facility. Click Save, and then click
Add Record to create additional facility records.
Secure Perfect 6.1.1 User Manual 167
File Menu Selections
The following selections display in the File drop-down menu:
Save Record
New Record
Delete Record
Notes
Logoff
Print Setup
Print Preview Report
Print Report
Export
Save Template As
Set As Default Template
Create Default Template
Delete Template
Check for Update
Exit
Filters Tab - Alarm History Report Form
Use this tab to select the criteria by which this report will be generated.
• Micro: Select the micro you want to use to generate report information. If you want to use all
micros, select <ALL>.
• Alarm: Select the alarm you want to use to generate report information. If you want to use all
alarms, select <ALL>.
• Priority: Select the alarm priority you want to use to generate report information. If you want
to use all alarm priorities, select <ALL>.
Filters Tab - Badge History Report Form
Use this tab to select the criteria by which this report will be generated.
• Badge Number: Select the range of badge numbers you want to display on the report. If you
want to list all badges, leave these fields blank.
• Employee Name: Select the range of person last names you want to display on the report. If
you want to list all persons, leave these fields blank.
• Employee Number: Select the range of employee numbers you want to display on the report.
If you want to list all numbers, leave these fields blank.
Secure Perfect 6.1.1 User Manual 168
Filters Tab - Badge Report Form
This tab is used only when generating a Badge Report. Use this tab to select the criteria by which this
report will be generated.
• Badge Number: Select the range of badge numbers you want to display on the report. If you
want to list all badges, leave these fields blank.
• Badge status: To provide additional filtering, you can also select to list only those badges
assigned a selected status.
Filters Tab - Device Report Form
This tab is used only when generating a Device Report. Filter or select specific information you want to
display on the report.
Device: From the drop-down list, select a device that you want to use to generate report information. If
you want to use all, select <ALL>.
The following exceptions apply:
• If a Camera or Digital Video Recorder was selected as Report Type on the General tab, the
Device drop-down list fills with DVRs only.
• If Alarm – API Connections is selected as Report Type on the General tab, the drop-down list
contains only <ALL>.
For all other Report Types, the list fills with micros.
Filters Tab - DI History Report Form
Use this tab to select or limit the criteria by which this report will be generated.
• DI State: Select the state of this DI as Set, Reset, Open, or Short. If you want to use all DI
states, select <ALL>.
• Micro: Select the micro you want to use to generate report information. If you want to use all
micros, select <ALL>.
• DI Type: Select the DI type as Alarm, Elevator, or Inactive. If you want to use all DI types,
select <ALL>.
• DI Description: Enter the range of device descriptions on which you want to report. Leave
blank for all descriptions.
• Micro Description: Enter the range of micro descriptions on which you want to report. Leave
blank for all descriptions.
Filters Tab - Operator History Report Form
Use this tab to select the criteria by which this report will be generated.
• Activity Type: Enable the activity types on which you want to run the report.
• Login Name: Select the operator you want to use to generate report information. If you want
to use all operators, select <ALL>.
• Form Name: Select the forms you want to use to generate report information. If you want to
use all forms, select <ALL
Secure Perfect 6.1.1 User Manual 169
Filters Tab - Person Report Form
This tab is used only when generating a Person Report. Use this tab to select the criteria by which this
report will be generated, allowing you to narrow the selection of information displayed on your report.
• Employee Last Name: Select the range of person last names you want to display on the
report. If you want to list all persons, leave these fields blank.
• Department: To provide additional filtering, you can select to run a report on only those
persons in a selected department.
• Personnel Type: To provide additional filtering, you can also select to list only those persons
assigned a selected personnel type.
Filters Tab - Schedule Report Form
This tab is used only when generating a Schedule Report. Filter or select specific informaiton you want
to display on the report.
Micro: From the drop-down list, select the micro you want to use to generate report information. If you
want to use all micros, select <ALL>.
Filters Tab - Time and Attendance History Report Form
Use this tab to select the criteria by which this report will be generated.
• Employee Last Name: Select the range of person last names you want to display on the
report. If you want to list all persons, leave these fields blank.
• Department: To provide additional filtering, you can select to run a report on only those
persons in a selected department.
• Personnel Type: To provide additional filtering, you can also select to list only those persons
assigned a selected personnel type.
• Round By: Select the criteria by which you want the time of the time and attendance
transaction rounded by: Hour, Half Hour (30-minute increments), Quarter Hour (15-minute
increments) or Minute.
Filters Tab - Zone History Report Form
This tab allows you to limit the person or badgeholder records printed on this report.
• Badge Number: Enter the range of badge numbers you want listed on this report. Leave
blank for all badges.
• Employee Name: Enter the range of employee last names on which you want to generate a
report. Leave blank for all names.
• Employee Number: Enter the range of employee numbers on which you want to report.
Leave blank for all numbers.
Find Badge
Select a reader from the drop-down list of this dialog box, present a badge at that reader, and this form
displays the record that is associated with the badge presented. If a record is not currently in SP, you can
add it. This is a convenient way of finding the badge record for a card without searching all records.
Secure Perfect 6.1.1 User Manual 170
Flash Micro Icon
Click this graphic to download the latest firmware to the selected micro:
When the Micro Flash & Micro Parameter Configuration dialog box displays, click Start Flashing
Micro(s).
Upgrades: Secure Perfect 6.0 software will communicate with micros flashed with 4.X and later firmware.
All offline badge and alarm transactions will be uploaded to the Server computer after the conversion
process and stored in the appropriate history table. Allow all the offline transactions to be processed
before flashing micros to the 6.0 firmware to minimize data loss. The duration of time to upload is
dependent on the number of transactions stored and the length of time that the Server computer will not
communicate with the micros. This might be a few minutes or serveral hours.
Floor
Administration Menu
The Floor option opens the Floor Form that allows you to create a description for a floor as well as
assign the floor number. This floor record will be used when configuring an elevator.
Floor Access
Reports Menu
The Floor Access option opens the Floor Access Report form that allows you to create a report based
on the floors defined in the system and the access granted to each floor
Floor Assignment
This window displays when you click Assign Floors, enabling you to select and assign a floor
association for this form. Only floors assigned to the selected elevators will be available for assignment.
Only floors in the operators’ facilities are available for assignment by this operator.
• Select, and then click the right arrow to assign an available floor.
• Select, and then click the left arrow to unassign a floor.
The floors that display in this list are those that are configured on the Floor Form.
Floor/Digital Output/Digital Input Selection Dialog
Use this dialog box to create or edit a floor-to-digital-output-to-digital-input link.
• Floor: Select a floor from the drop-down list of available floors.
• Digital Output: Select a digital output from the drop-down list of available DOs.
• Digital Input: Select a digital input from the drop-down list of available DIs.
Click OK to accept your selections and close this form.
Secure Perfect 6.1.1 User Manual 171
Floor/Digital Output/Digital Input Tab
Elevator Form
This tab displays ONLY if you select Floor Tracking By Input from the Floor Tracking field on the
Elevator tab.
Select this tab to link a digital output and a digital input to a floor.
Elevator control does not span micros. This means the reader, digital outputs, and digital inputs (if
applicable) MUST be on the same micro.
Assigned Floor/Digital Output/Digital Input
This windowpane lists the currently assigned floors, digital outputs, and digital inputs.
• Edit: To edit a floor/digital output/digital input link, select an entry from list and click this
button. The Floor/Digital Output/Digital Input Selection dialog displays.
• Add: To add a floor/digital output/digital input link, click this button. The Floor/Digital
Output/Digital Input Selection dialog displays.
• Remove: To remove a floor/digital output/digital input, select an entry from the list and click
this button.
Floor/Digital Output Selection Dialog
Use this dialog box to create or edit a floor-to-digital-output link.
• Floor: Select a floor from the drop-down list of available floors.
• Digital Output: Select a digital output from the drop-down list of available DOs.
Click OK to accept your selections and close this form.
Floor/Digital Output Tab
Elevator Form
This tab displays ONLY if you select No Floor Tracking or Floor Tracking By Keypad from the Floor
Tracking field on the Elevator tab.
Select this tab to link a digital output to a floor.
Elevator control does not span micros. This means the reader, digital outputs, and digital inputs (if
applicable) must be on the same micro.
Assigned Floor/Digital Output
This box lists the currently assigned floors and digital outputs.
• Edit: To edit a floor/digital output link, select and then click this button. The Floor/Digital
Output Selection dialog displays.
• Add: To add a floor/digital output link, click this button. The Floor/Digital Output Selection
dialog displays.
• Remove: To remove a floor/digital output, select and then click this button.
Secure Perfect 6.1.1 User Manual 172
Floor Tab
Access Right Form
This tab allows you to configure controls for elevators and floors by assigning them to access rights.
• Assigned elevators: This windowpane displays a list of the elevators assigned to the current
access right.
• Assign Elevators: Click this button to display the Elevator Assignment dialog box and select
from a list of elevators available for assignment by this operator. If no elevators are listed,
check that the elevators have been configured on the Elevator Form.
• Assigned floors: This windowpane displays the floors assigned to the current access right.
• Assign Floors: Click this button to display the Floor Assignment dialog box and select from a
list of floors available for assignment by this operator. Only floors assigned to the selected
elevators will be available for assignment. If no floors are listed, verify that the floors have
been configured on the Floor Form.
Floor Tab
Floor Form
Use this tab to create a description for a floor
• Description: Enter a description for the floor.
• Floor Selection: Click the drop-down list of number to select a floor number.
Floor Tracking By Input
Define the floors available. Define a digital input (DI) and digital output (DO) for each floor. The DIs are
used for floor selection. Only DIs provided by the 20 DI board may be used for floor selection and each DI
may be used in only one elevator and mapped to only one floor. The DOs are used to control where the
elevator moves. Only DOs provided by the 16 DO board may be used and each digital output may only
be used in one elevator and mapped to one floor. A maximum of 32 floors can be supported.
Floor Tracking By Keypad
Define the floors available and define a digital output (DO) for each floor. The reader's keypad is used to
select the desired floor. Only DOs provided by the 16 DO board can be used. In addition, each DO may
be used in only one elevator and mapped to only one floor. The number of floors is limited by the number
of 16 DO boards that can be placed in the Micro/5-PX; the maximum is 4. Therefore, the maximum
number of floors available is 64 (4 boards x 16 DOs = 64 DOs).
Secure Perfect 6.1.1 User Manual 173
Fonts Tab
This tab is used to change the fonts on selected text in the report, when generating any report.
Be careful when selecting font styles and sizes. Some styles may not appear as desired when printed
and some sizes may be too large for the page. Use the Print Preview option to check how the font style
and size will print on a page.
• Title: To change the current font of the report title, click Change to display a list of available
fonts, font styles, and font sizes.
• Header Fields: To change the current font of the report headings and/or field descriptions
within the report, click Change to display a list of available fonts, font styles, and font sizes.
• Group Fields: To change the current font of the group headings, click Change to display a list
of available fonts, font styles, and font sizes.
• Data Fields: To change the current font of the report information, click Change to display a
list of available fonts, font styles, and font sizes.
• Page Footer: To change the current font of the report footer, click Change to display a list of
available fonts, font styles, and font sizes. The report footer contains the report title, current
system date, and the page number.
Functions Schedule Tab
Reader Form
Use this tab to select the schedules that will be used to set a reader offline/online or lock/unlock a door.
Time schedules define intervals which include a start AND an end time for different days of the week and
modes. At the start of the schedule, the state of the reader changes to the scheduled value. At the end of
the schedule, the state of the reader returns to the nonscheduled value. For example, if a reader is
scheduled online, it will return to offline at the end of the schedule.
Reader schedule
• Time schedule: Select a time schedule from the drop-down list.
• Online/Offline: Select whether the schedule chosen above will set the reader online or offline.
Door schedule
• Time schedule: Select a time schedule from the drop-down list.
• Unlock/Lock: Select whether the schedule chosen above will lock or unlock the door
controller by this reader.
• Disable Auto Unlock: Select this check box to temporarily disable the schedule that would
automatically unlock a door at the start of a new time schedule. When a valid badge is
presented to the reader for the first time and during the current time schedule in effect, the
door unlocks for the first time and the schedule is now in place, as configured. If no valid
access has been detected from start of schedule to current time, the micro will continue to
wait for valid badge access before implementing the schedule. If a Lock schedule is selected,
this feature is grayed out and not available for selection.
Example: This is particularly helpful if a snowday or hurricane prevents employees from
entering the building at the normal time. Although the current schedule would normally unlock
the door, the door remains locked until the first employee arrives at the reader and presents
a valid badge.
Secure Perfect 6.1.1 User Manual 174
G
General Tab
Badge, Schedule, Floor Access, Reader Access, Roll Call, Alarm History, Badge History, Zone
History, DI History, Operator History Reports
Use this tab to set the general parameters for grouping and presenting the information of the form.
• Report Title: Enter a name for this report, up to 64 characters.
• Group Records: Select the field by which you want to group the records. Field titles vary with
type of report.
• Sort Groups: Select the fields by which you want the groups sorted and position the fields in
order of precedence. If this box is empty, click Add to select fields.
Add: Click to select the fields by which you want to sort the groups. This displays the Sort
Fields dialog.
Delete: Select a field and click to remove a field from the Sort Groups list.
Up: Select a field and click to increase the priority of this field, which determines how the
groups will be sorted.
Down: Select a field and click to lower the priority of this field, which determines how the
groups will be sorted.
Example: To display and review a report of personal by Department, select the Group Records field as
Department. Select a Sort Group of Last Name, then First Name. Click Save. Select Print Preview from
the File menu. The report displays, sorted alphabetically by Department, then last name, then first name.
General Tab
Person, Administration, Device, and Time and Attendance History Reports
This form sets the parameters of the report.
Report Title: Enter a title for this report, of up to 64 characters.
Report Type: Select the type of report you want to run.
If this is a Person Report, the following options are available:
• Access Rights Data provides a description of all access this person has, and if access is
granted all times in all modes.
• Badge Data provides the badge number, PIN, status, issue, and expiration dates for each
badge the person has been assigned.
• Location Data provides the address and telephone number for each person.
• Standard Data provides the last name, first name, initials, personnel description, department,
employee number, and extended unlock time. This information is also provided on the other
report types for person reports.
• User Data provides up to 90 user fields on each person. You can select which ones to
include in the report.
If this is an Administration Report, the following options are available:
• Alarm Instruction provides a listing of alarm messages defined in the system.
• Alarm Notifier provides a listing of e-mail alarm notification information defined in the system.
• Alarm Routing and Bumping provides a listing of schedule descriptions, routing clients, time
to bump, bumping clients, routing clients, assigned alarms, and comments.
• Archive provides a listing of all the archive files currently in the Database directory.
• Badge Format (UBF) provides a listing of custom badge format types, data and parity
layouts, number of facility and badge characters, and comments.
• Client provides a listing of the clients defined on the system, their Region, autoshutdown
selection, and whether they have an Imaging license.
• Event Trigger provides a listing of defined event triggers defined in the system, including
Intrusion Zone events.
• Events provides a listing of events defined on the system.
Secure Perfect 6.1.1 User Manual 175
• Facility provides a listing of all facilities defined on the system.
• Floor provides a listing of floor descriptions and their associated floor selection numbers.
• Guard Tour provides information associated with each Guard Tour configured in the Secure
Perfect system, including Groups, Tour Points, and badges assigned.
• Host Parameter provides a listing of information from the Parameter Form, including
database connection timeout, database retry count, e-mail addresses, e-mails sent, and
duress.
• Intrusion Zone provides a list of intrusion zones and the micros that own them.
• Operators provides a listing of operators and their permissions defined on the system.
• Permission provides a listing of permissions defined on the system.
• Response provides a listing of responses defined on the system.
• Schedules provides a listing of time and mode schedules defined on the system.
If this is a Device Report, the following options are available:
• Alarm provides a listing of alarms defined on the system and alarm specific information.
• Alarm – API Connections provides a list of alarm details defined in the system, received
through an external interface.
• Alarm – Camera provides a list of Kalatel camera alarm details defined in the system as well
as the DVMRs that own them.
• Alarm – DVMR provides a list of Kalatel DVMR alarms defined in the system.
• Alarm Group provides a listing of alarm groups defined on the system and the micro that
owns the groups.
• Cameras provides a list of cameras and camera details such as camera presets on the
system and the DVR(s) that own them.
• Digital Input provides a listing of digital inputs (DI) defined on the system and DI-specific
information.
• Digital Output provides a listing of digital outputs (DO) defined on the system and DO-specific
information.
• Digital Output Group provides a listing of digital output groups defined on the system and the
micro that owns them.
• Digital Video Recorder provides a list of DVRs defined on the system and DVR-specific
details.
• Elevator provides a listing of elevators defined on the system and elevator-specific
information.
• Micro provides a listing of micros defined on the system and micro-specific information.
• Reader provides a listing of readers defined on the system and reader-specific information.
If this is a Time and Attendance Report, the following options are available:
• First In Last Out calculates the difference between the first In transaction and last Out
transaction within the time period you specify on the Date Range tab. All other transactions
are ignored.
• Paired In Out calculates the difference between all In and Out transactions within the time
period you specify on the Date Range tab. The earliest In is paired with the first Out following
it and both times are displayed together followed by the difference between them in hours.
The next In along with its paired Out are displayed together on the next line. This continues
until all Ins and Outs have been paired together and displayed.
An error message will display if:
• There is not a matching number of In transactions and Out transactions within a specified
time period.
• There are two In transactions without an Out between them.
• There are two Out transactions without an In between them.
Group Records: Select the field by which you want to group the records. This provides the organization
of the report. The choices in the drop-down list correspond with the selection of Report Type. This option
may not be available on all report types.
Sort Groups: Displays the fields in order of precedence by which the groups will be sorted. If this box is
empty, click Add to display a list of available fields. This option may not be available on all report types.
• Add: Click to select the fields by which you want to sort the groups. This displays the Sort
Fields dialog.
• Delete: Select a field and click to remove a field from the Sort Groups list.
• Up: Select a field and click to increase the priority of this field, which determines how the
groups will be sorted.
Secure Perfect 6.1.1 User Manual 176
• Down: Select a field and click to lower the priority of this field, which determines how the
groups will be sorted.
Global Edition Regional Configuration Rules
This topic addresses administration and behavior of a successful Secure Perfect Global Edition system.
Particular functions in the Global Edition must be handled locally, at the Regional level. The following
table is an overview of administrative functions and links to forms where configuration and behavior must
be considered.
Secure Perfect
Updates Allowed
Deletions
Comments
Form
in Remote
Allowed in
Regions?
Remote
Regions?
Access Rights Form
Yes Yes
Adding or deleting readers from an access
– Readers Only
right for a local Region or remote Region:
The micros get updated with the correct
reader information in both cases
Digital Output Groups, Elevators, and
Zone assignment for access right must
wait until replication interval to update the
remote database and then perform a
database download to micros in the
remote Region.
Alarm Form No (See
N/A
Updating in a Remote Region: Updates to
Comments)
nonmicro alarms (such as CCTV, Camera,
and DVR alarms) are allowed. Updates to
devices directly controlled by I/O boards in
the micro (such as digital inputs and
readers) are not allowed. They must be
updated at a local Regional level.
Alarm Group Form No N/A
Badge Alias Form Yes Yes No action required.
CCTV Alarm Form Yes Yes No action required.
Client Form Yes Yes Backup Clients tab, Assign micro phone
numbers
No action required.
Digital Input Form No N/A
Digital Output Form No N/A
Digital Output
No No
Group Form
Digital Video
Yes Yes
Editing a DVR in a remote Region: Wait for
Recorder
replication to occur before changes take
effect. If user changes the host name to a
remote client, wait for replication to occur
and then restart the hosting client’s
services.
Adding a DVR in a remote Region: Wait for
replication to occur and then restart
services on the remote client.
Elevator Form Yes Yes
Editing an elevator in a remote Region:
Edits will not be applied until replication
occurs on the remote database. After
replication, the operator must manually
initiate a database download from the
Micro Utility Form in order for changes to
Secure Perfect 6.1.1 User Manual 177
take effect.
Event Schedule
Yes Yes
Updating remote Regions: Wait for
Form
replication interval and then perform a
database download. Applies to adds and
deletes.
Floor Yes Yes No action required.
Intrusion Zone
No No
Form
Manual Control
Yes Yes No action required.
Form
Micro Form Yes Yes
Editing a micro in a remote Region: Wait
for replication to occur and then perform a
database download to that micro. If the
user changes the host name to a remote
client, wait for replication to occur and then
restart the hosting client’s services.
Adding a micro in a remote Region: Wait
for replication to occur and then restart
services on the remote client.
Mode Schedule
Yes Yes
Updating remote Regions: Wait for
Form
replication interval and then perform a
database download. Applies to adds and
deletes.
Override Form Yes Yes No action required.
Reader Form No N/A
Time Schedule
Yes Yes
Updating remote Regions: Wait for
Form
replication interval and then perform a
database download. Applies to adds and
deletes.
Tour Point Form No N/A All tour points must be associated with
micros within the same Region.
Group Tab
Alarm Group Form
Use this tab to schedule when the alarms in the group are monitored or when to print alarm transactions
by assigning previously defined time schedules to alarm groups.
Number: This is a read-only field. Displays the number of the alarm group.
Micro: This is a read-only field. Displays the description of the micro on which this alarm group is located.
Monitoring
• Time schedule: Select a time schedule from the drop-down list.
• On/Off: Select On if the above schedule is when you want to monitor the alarm group or Off if
the above schedule is when you do not want to monitor alarms belonging to this alarm group.
Print Alarm
• Time schedule: Select a time schedule from the drop-down list.
• Yes/No: Select Yes if the above schedule is when you want to print alarms belonging to this
alarm group or No if the above schedule is when you do not want to print alarms belonging to
this alarm group.
Secure Perfect 6.1.1 User Manual 178
Guard Tour Assignment Dialog Box
This window displays when you click Guard Tour Assignment, enabling you to select and assign Guard
Tours that you want to trigger an event.
• Select, and then click the right arrow to assign a Guard Tour.
• Select, and then click the left arrow to unassign a Guard Tour.
Click OK to display the results in the Assigned Guard Tours windowpane.
Group Tab
Digital Output Group Form
Use this tab to assign digital outputs to a selected digital output group on a specified micro.
Number
This is a read-only field displaying the number assigned to the digital output group.
Micro
This is a read-only field displaying the description of the micro on which this digital output group is
located.
Digital Outputs
This windowpane displays the digital outputs assigned to this group.
Assign Digital Outputs
Click this button to display the Digital Output Assignment dialog box. This dialog lists all digital outputs
available.
Guard Tour
Administration Menu
The Guard Tour option opens the Guard Tour form that allows you to enter a description for your Guard
Tour inspection and configure the Tour Manager PC, Start Point, tour time, and points.
This option is unavailable if you are not licensed for Guard Tour.
Guard Tour History
Reports Menu
The Guard Tour History option opens the Guard Tour History Report Form that allows you to generate a
report of completed tours displaying tour activities such as start points, hits, invalid points, pauses,
resumes, tour end points, tour time exceeded, manual start and manual stop.
Secure Perfect 6.1.1 User Manual 179
Guard Tour Tab - Guard Tour Form
Reference Topic:
Point Assignment Dialog Box
Badge Assignment Dialog Box
Configure the specifics of this tour by completing the elements displayed on this tab.
Requirements are indicated by an asterisk.
Element Description
Tour Host Computer*
From the drop-down list, select the computer that will host this tour. Guard
tours must be owned by a specific client host.
Start Tour Point*
From the drop-down list, select a tour point as the start point of this tour.
• Only direct and network micro devices display in this drop-down list.
• When you select a start point, becomes available.
• Enter the maximum number of minutes that this tour is allowed to last.
Max tour time (min)*
When the maximum time is reached, a tour is ended automatically.
• The default and maximum number of minutes in this field is 480.
Route Activity to
Select this check box to route badge activities to a selected and enabled
Printer
system printer at the client computer that is hosting the Guard Tour. You must
have two separate printers configured if you are using a printer for tour
activitiess and a printer for badges.
• Displays a list of assigned tour points. All tours are random. A random tour
Tour Points*
is a tour where all of its points do not need to be hit in a particular order,
except the assigned start point.
• Every time this tour is executed, the order of ‘hit’ points can vary. A random
tour ends automatically when all of its tour points have been hit.
• Click to display a Point Assignment dialog box, allowing you to assign Tour
Assign Tour Points*
Points to this tour.
• Selection results display in the Tour Points windowpane.
Move Up
Select and click to move this Tour Point up the list. This tour point order
displays on the Manual Control form, Guard Tour tab.
Move Down
Select and click to move this Tour Point down the list. This tour point order
displays on the Manual Control form, Guard Tour tab.
Tour Badges*
Displays a list of assigned tour badges. At least one badge must be assigned
to a tour.
• Click to display a Badge Assignment dialog box, allowing you to assign
Assign Tour Badges
badges to this tour.
• If a reader is assigned as a tour point, a badge must be assigned before
this Guard Tour record can be saved.
• Click to save this tour record and simultaneously create a new alarm,
Save*
Guard Tour Max Time Exceeded.
• If you have not completed the required elements, you cannot save.
Secure Perfect 6.1.1 User Manual 180
Guard Tour Tab - Manual Control Form
Reference Topics:
Guard Tours Form
Tour Point Form
This tab does not display if you are not licensed for Guard Tour.
The purpose of using this form is to manually start, pause, resume, or stop a Guard Tour that is currently
in progress. The upper windowpane displays all Guard Tours configured in your Secure Perfect system to
which this operator has access.
Element Description
Upper Windowpane:
• Guard Tour
A list of configured tours descriptions in the Secure Perfect system.
• Tour State
This column displays the current state of all Guard Tours in your Secure
Perfect system. Typical states are: 1) Tour Started; 2) Tour Not Started; 3)
Tour Paused.
• Time to Complete
This column displays the estimated time assigned for completion of a tour,
based on the clock time that this tour started and maximum tour time
allowed. If a tour is paused and later resumed before expiration of
estimated completion time, the remaining unused tour time is reflected in
the Time to Complete column.
• Client Description
This column displays the client that is hosting the selected tour. A color
indicator displays the current connection status of the client that is hosting
the selected tour.
• Green indicates online.
• Red indicates offline.
Lower Windowpane:
• Tour Point
This column displays a list of points associated with the selected Guard
Tour.
• Point Status
This column displays a ‘hit’ or ‘not hit’ real-time status. You do not have to
refresh your window to see the current state of the tour points for the
selected tour.
• Last Hit Time
This column has an entry following a valid ‘hit’ to this point.
Set Tour to:
• Start
Verify that the appropriate tour is selected in the upper windowpane. Click
to manually begin a Guard Tour. The Tour State column indicates ‘Tour
Started.’
• Stop
Verify that the appropriate tour is selected in the upper windowpane. Click
to prematurely stop a tour in progress. The Tour State column indicates
‘Tour Not Started.’ This button is not available if a tour is not in progress.
• Resume
Verify that the appropriate tour is selected in the upper windowpane. Click
to resume a tour that was previously paused. The Tour State column
indicates ‘Tour Started.’ This button is unavailable if a tour is not in
progress. This button is not available if the time assigned for the selected
tour has expired.
• Pause
Verify that the appropriate tour is selected in the upper windowpane. Click
to pause a tour that is currently in progress. The Tour State column
indicates ‘Tour Paused.’ This button is unavailable if a tour is not in
progress.
• Purpose
Specify a reason for stopping or starting this tour. Enter a brief statement
about the operator’s actions.
Secure Perfect 6.1.1 User Manual 181
Guard Tours Tab - Guard Tour History Report
Click Edit to display the Guard Tour Assignment Dialog Box, enabling you to assign Guard Tours for
which this report will generate.
The assigned Guard Tours display in the open window pane of this tab.
Secure Perfect 6.1.1 User Manual 182
H
Help Doesn't Display in My Assigned Language
This occurs when you are using either a non-English operating system or a non-English Secure Perfect
and you did not correctly shut down SP. To eliminate this problem, you MUST select the File menu and
then Exit to correctly shut down SP.
Help Topics
Help Menu
Selection of this option starts the Secure Perfect Help system.
You can also click the Help icon to access Help , then move the ? over any area of your display and
click again. A window will open with information pertaining to the selected section.
Click the Show me icon to view a step-by-step animated demo.
Using Help Contents
Using Help Index
Using Help Search
Hex Characters
Valid and allowable hex characters include the base 16 numbering system (0 through 9 and A through F).
How Do I Perform a Search on a Specific Form
The Secure Perfect Search button can be found on any form that provides search capabilities. If you click
this button when the current form is blank, all records will be returned. To specify criteria, fill in the
information.
Example: If you want to find all badgeholders with the last name Smith, type Smith in the Last name
field and click Search.
You can also use the * character that allows you to search for patterns.
Example: A search for badgeholders with the last name starting with Sm* would yield such names as
Smith and Smythers.
How Do I Put a Reader Online
From the Secure Perfect main menu, go to Device, then Reader. Click Search to display existing reader
records. From the right windowpane, select the reader you want to set online, then select Online and
Active.
Secure Perfect 6.1.1 User Manual 183
How Do I Remove an Alarm from the Alarm Monitor Form
When an alarm displays on the Alarm Monitor Form, appropriate action should be taken. For example,
you may want to send a guard out to check that a door is secure. Once the alarm has been investigated
and reset, if necessary, it should be removed from the Alarm Monitor Form.
1. Some alarms may require an acknowledgment before they can be removed. This feature is set on
the Alarm Form. To acknowledge the alarm:
Without a response, click Acknowledge and the Process state for that alarm will change to
Acknowledged.
With a response, click Responses to select a predefined response or enter your own in the
Response field. Then, click Acknowledge and the Process state for that alarm will change to
Acknowledged.
2. To remove an individual alarm without waiting for it to reset, highlight the alarm and click Remove
Individual.
3. If you have permission, you can remove all alarms in one action by clicking the Remove All icon:
How Do I Troubleshoot My Global Edition System?
Reference Topic:
Replication and Synchronization Conflicts
Review the Secure Perfect 6.0 Installation Guide chapter covering "Installing Secure Perfect 6.0 Global
Edition." Confirm and review your configuration options, then review the Troubleshooting section.
Additionally, refer to Microsoft Replication software documentation in printed and electronic format.
Secure Perfect 6.1.1 User Manual 184
I
Installing the Printer Driver
To install the print driver for your badge printer:
1. Follow the instructions shipped with your printer.
2. Select the appropriate printer port.
3. Select a name for the printer and indicate if it is the default printer.
4. Do not print a test page; click Finish.
5. After the installation is complete, move the mouse pointer over the printer icon, click the right
mouse button, and select and set Properties.
6. Complete the printer setup and then click Exit.
NOTES:
• The printer may NOT support transparent bitmaps.
• If the printer run out of cards or the ribbon need to be replaced while in the process of producing
badges, an error message will display. Correct the condition at the printer and then put the printer back
online before continuing with your print job.
Instruction
Administration Menu
The Instruction option opens the Alarm Instruction Form that allows you to create instructions on how to
react to alarms and link with alarm records. The instruction(s) will then display on the Alarm Monitor Form
when the alarm occurs.
Intrusion Zone
Administration Menu
The Intrusion Zone option opens the Intrusion Zone Form that allows you to create zones, assign
intrusion DI, intrusion DO, alarms, and readers. The Status Tab displays current state of the zone and
status of all assigned devices.
Intrusion Zone Assignment Dialog Box
This window displays when Assign Intrusion Zone is clicked on the Intrusion Zones tab of the Access
Right form or Event Trigger form. The window displays a list of all intrusion zones for the micros in the
facilities available for assignment by this operator. You can assign an unlimited number of intrusion zones
to an access right.
• Select, then click the right arrow to assign an available intrusion zone.
• Select, then click the left arrow to unassign an intrusion zone.
Click OK to accept the selections and display the Intrusion Zones in the Assigned Intrusion Zones list
box.
Secure Perfect 6.1.1 User Manual 185
Intrusion Overview
Reference Topics:
Arm/Disarm an Intrusion Zone
Intrusion Zone Form
Activity Monitor Form
About Intrusion Options
Intrusion functionality provides the ability to define local intrusion zones per micro that consist of:
• Readers
• Alarms
• Arm/disarm input point Intrusion DI
• Arm/disarm output point DO
The defined intrusion zones have the ability to be armed and disarmed through access control by using a
card and keypad reader, DI, or manual control.
The intended application is suited for arming and disarming intrusion zones from outside of the monitored
and secured areas. Based on Secure Perfect system architecture, it is not our intent to fully emulate
traditional Burg/Intrusion panel functions but to provide similar functionality for less stringent
Burg/intrusion requirements that can be taken on natively within the access control system. Additionally,
the system provides increased value by allowing cross-system functionality between the Secure Perfect
micro and vendor-independent Burg/Intrusion panels.
Arm/Disarm Intrusion Point - Digital Input Form
• An Intrusion DI Type has been added to the drop-down list on the Digital Input Form, Digital
Input tab.
• When the Arm/Disarm Intrusion point is set/active (Armed), the associated zone is armed by
placing all readers offline, all alarm points monitored on, and the arm/disarm DO goes active.
• When the Arm/Disarm Intrusion DI is reset/not active (Disarmed), the associated zone is
disarmed by placing all readers online, all alarm points monitored off (unless on a schedule),
and the arm/disarm DO goes inactive.
Intrusion Zone – Intrusion Zone Form
The Intrusion Zone Form is required for creating a relation between readers, alarm inputs, the
Arm/Disarm Intrusion point, and the arm/disarm DO.
1. An Intrusion Zone is defined with a description and facility assignment.
2. A micro selection is required to establish the zone source and its intrusion points.
3. The Intrusion Zone tab provides for the assignment of the following intrusion zone components:
arm/disarm DO, arm/disarm Intrusion DI, readers, and alarms.
Arm/Disarm Intrusion DI: This is a single record selection from a drop-down list filtered by
active facility that consists of all available Arm/Disarm Intrusion points for the micro. Only the
Dis that have not been assigned will be available.
Alarm Points: This is a multi-record selection from an assignment dialog filtered by active
facility that consists of available micro alarm points not already assigned to a zone. (24/7 4-
State Supervision rules apply regardless of the Armed/Disarmed state of the zone.)
Readers: This is a multi-record selection from an assignment dialog filtered by active facility
that consists of available readers not already assigned to a zone. (Readers must be active
and nonelevator type.)
A zone can be configured to contain the following:
An Arm/Disarm Intrusion Point with Alarm Points only and no Readers.
An Arm/Disarm Intrusion Point with Readers only and no Alarm Points
Alarm Points and Readers only with no Arm/Disarm Intrusion Point.
Readers only.
An arm/disarm DO can be assigned for any of these.
4. A Status tab provides the ability to request status of the zone and each of its associated points, as
follows.
Zone: Armed or Disarmed
Secure Perfect 6.1.1 User Manual 186
Arm/Disarm Intrusion DI: Active/Inactive/Trouble
Readers: Online or Off-Line
Alarm Points: Monitored Off/Monitored On
Arm/Disarm By Access Right
The Intrusion Zones tab of the Access Right Form allows you to assign multiple intrusion zones using an
assignment dialog.
• Only badge holders with an Intrusion Zone assigned on the Access Right Form will be able to
arm and disarm zones using any of the card/keypad readers within a zone.
• When a zone is armed, all readers within the zone will go offline, and normal access rights
will not gain access into the area.
• When a zone is disarmed, all readers within the zone will go on-line and normal access rights
will gain access into the area. If schedules were assigned, then the reader will follow the
schedule.
If you expect to arm/disarm by using any one of the readers within a zone:
• That reader must be assigned on the Access Right tab of the Access Right Form and be an
assigned reader in the Intrusion Zone listed on the Intrusion Zone tab.
OR
• Individually created access rights must be assigned to the person that will arm/disarm the
Instrusion Zone. (One right will allow access to the readers and another right will allow
access to the Intrusion Zone.)
Arm/Disarm by Manual Control
Manual zone control for arming and disarming is accomplished using the Intrusion Zone tab on the
Manual Control Form. This follows the standard Manual Control Form conventions including a Purpose
entry by the operator.
Intrusion Zone Tab
Reference Topic:
Intrusion Zone Form
Intrusion Zone Assignment Dialog Box
Access Right Form
This tab allows you to assign intrusion zone control to previously created access rights. Access to a
reader and access to an intrusion zone are two separate access rights. Only badge holders with an
Arm/Disarm Intrusion Zone access right will be able to arm and disarm zones by accessing a
card/keypad reader within a zone. When a zone is armed, all readers within that zone go off-line;
therefore, normal access rights will not gain access into the area.
Assigned Intrusion Zones: This windowpane displays a list of previously assigned intrusion zones for
the currently selected access right record.
Assign Intrusion Zone: Click this button to display the Intrusion Zone Assignment dialog box, allowing
you to assign and unassign intrusion zones to the selected access right. If no intrusion zones display,
verify that intrusion zones were configured on the Intrusion Zone Form.
If you do not have valid access to a reader that belongs to an Intrusion Zone due to a schedule in that
access right, you will not be able to arm/disarm a zone.
Secure Perfect 6.1.1 User Manual 187
Intrusion Zone Tab - Event Trigger Form
Reference Topic:
Intrusion Zone Assignment
This tab allows you to assign Intrusion Zones and Intrusion Zone transaction type(s) that will become the
source for this Event Trigger.
Element Description
Transactions:
Select any one or all of the types of Intrusion Zone
transactions that will trigger an event.
• Arm
Intrusion Zone arm transaction in progress.
• Disarm
Intrusion Zone disarm transaction in progress.
• Invalid
Intrusion Zone arm/disarm transaction failed for one of the
following reasons:
• Device or badging failed. The zones are not secure.
• The arm/disarm device is not a part of the selected
zones.
• The 10-second time period allowed for completion of
the arm/disarm process at keypad and reader, has
expired.
• The presented badge does not have access rights for
transactions in the selected Intrusion Zones.
Tag Selection:
Select one of the options.
• None
No tag is sent for marking a recorded video or
manipulating the record rate.
• Tag only
A tag is sent for marking recorded video at the camera(s)
current record rate.
• Tag as event
A tag is sent to the DVR for marking recorded video and
for changing the camera(s) record rate to its event record
rate settings.
Assigned
This list box displays those Intrusion Zones that you have
Intrusion Zones
assigned to this Event Trigger.
Assign Intrusion
Click to display an Intrusion Zone Assignment dialog box,
Zone
listing available Intrusion Zones in your Secure Perfect
system. Those zones selected and assigned when you
close the dialog box, will display in this list box.
Secure Perfect 6.1.1 User Manual 188
Intrusion Zone Tab
Reference Topic:
Arm/Disarm an Intrusion Zone
Intrusion Zone Form
This tab allows you to edit or create an intrusion zone record and associate DI, DO, and devices such as
readers and alarms in the operators’ selected facilities.
Number: Assign and enter a number for the intrusion zone, between 1 and 96. Duplicate numbers are
allowed but not on the same micro.
Micro:
Select a micro from the drop-down list of available micros that will control this intrusion zone. This is a
one-to-one relationship and establishes the zone source and intrusion/access points. The micro must be
connected and online.
A Reader or Digital Input and Alarm must be selected in order to save this record.
Arm/Disarm DO: Select one DO from the drop-down list of DOs that will trigger when an Intrusion Zone
is armed/disarmed. This is an optional assignment. This DO can be assigned to another Intrusion Zone.
Arm/Disarm DI: Select one DI for the drop-down list of available DIs of the Type Intrusion, as
assigned on the Digital Input Form. This DI can arm/disarm an Intrusion Zone and is an optional
assignment. This DI cannot be assigned to another Intrusion Zone.
When you unassign a DI, save this record. It is now available to re-assign this DI to another Intrusion
Zone.
Last Status:
• Date: Date of last zone history transaction on record.
• Time: Time of last zone history transaction on record.
• Status: Status as of last zone history transaction on record.
In order to refresh this status section, click off of this record then back or close then reopen the form
Devices
Assigned Readers: This list box displays a list of available, active readers in the same zone, belonging
to the selected micro. You must assign at least one reader OR a digital input and alarm to an Intrusion
Zone. The reader cannot be assigned to an elevator. Click Assign Readers to display a dialog box that
enables you to assign active readers.
Assigned Alarms: This list box displays a list of intrusion alarms in the same zone, not already
assigned, on the selected micro. This cannot be an external, DVMR, or a logical such as Host Comm or
Lost Badge alarm. Click Assign Alarms to display a dialog box that enables you to assign alarms. This is
an optional assignment.
Arm Delay (sec)
Arm Delay: Enter the number of seconds to delay the arming of this intrusion zone. This field accepts up
to 255 seconds. This time limit should allow a person to pass into or out of a monitored area before the
zone is armed.
If your system is UL-listed, the delay cannot exceed 60 seconds. Refer to the UL Certification
Requirements in your Secure Perfect Installation Manual.
Secure Perfect 6.1.1 User Manual 189
Intrusion Zone Tab
Reference Topic:
Intrusion Overview
Manual Control Form
This form allows you to manually control the Intrusion Zone, and takes the Intrusion Zone from one
condition (armed) to another condition (disarmed), depending on the current operator’s permissions.
Example:
• When the Zone is Armed, readers will not allow access to anyone, alarm points are
monitored, and schedules are ignored.
• When the Zone is Disarmed, personnel require only access rights for readers.
Select micro
Immediately following selection of a micro, the system searches and displays Intrusion Zone records in
the list box windowpane, associated with the selected micro.
• All displays all micros in the operator’s facilities.
• By Micro displays records for a specific micro. Click the down arrow to display the list of
micros.
Columns in Windowpane
• Description: Description of the Intrusion Zone in the database.
• Micro: Micro on which the Intrusion Zone Control is located.
Set State To:
• Arm: Immediately arms the selected Intrusion Zone.
• Disarm: Immediately disarms the manual Intrusion Zone.
Purpose
When you select an Intrusion record, this box is enabled. Enter an explanation for arming/disarming the
Intrusion Zone. This field accepts 255 alphanumeric characters. These comments are written to the
operator history file and display in the Purpose Field, on the Operator History Report.
Secure Perfect 6.1.1 User Manual 190
K
Keypad Alarm Shunting
Reference Topics:
Both Read/Keypad Type Reader
Keypad Only Type Reader
Normal Type Reader
The keypad alarm shunting feature allows you to turn the monitoring of a group of alarms off or on using
the keypad. This can also be accomplished by setting up a schedule for an alarm group using a time
schedule.
Only reader board door inputs and 20DI board input points can be shunted from a keypad.
• To identify a reader board door input, look for a default description that follows this format: 0001-1-01
Reader.
• To identify a 20DI board input point, look for a default description that follows this format: 0001-1-01
DI.
Keypad Only Type Reader
Only reader board door inputs and 20DI board input points can be shunted from a keypad. (To
identify a reader board door input, look for a default description that follows this format: 01-1-01 Reader.
To identify a 20DI board input point, look for a default description that follows this format: 01-1-01 DI.)
Follow the steps below to shunt alarm groups within a micro connected to a keypad reader.
1. Click the start key on the keypad. The start key is labeled with either an asterisk <*> or a plus <+>
depending on the reader model.
2. Type one of the following:
0 - to turn monitoring off
1 - to turn monitoring on
3. Type the alarm group number (00 to 15) you want shunted.
4. Click the end key that is labeled with either a pound sign (#) or an <x>.
5. Click the start key on the keypad again.
6. Type your badge number on the keypad.
7. Click the end key (<#> or <x>).
Secure Perfect 6.1.1 User Manual 191
L
Launch Client
Select this icon from the Client Monitor toolbar, to enable a CCTV interface (other than integrated CCTV).
This option also displays on the shortcut menu for this form. The shortcut menu displays when you click
the right mouse button.
Licensing
Reference Topic:
About Secure Perfect
Your Secure Perfect software is licensed during the installation process. The license sequence is also
an item on the Start, Programs, Secure Perfect menu. Refer to the SP License Help system for
additional details of the licensing procedure.
Your license included Imaging software for Secure Perfect that controls the number of clients that can
launch Imaging. Imaging installs with every Secure Perfect installation; however, you cannot enable
Imaging on more computers than you have Imaging licenses. (Only clients that have an Imaging license
enabled can capture images and signatures, create badge designs, and print badges. If not all computers
require the license at the same time, you can enable and disable the license for the appropriate
computers.)
Thin client licenses are limited to Enterprise Server computers running Windows 2000/2003 operating
system. Licensing controls the number of computers that can host remote Secure Perfect sessions. You
cannot enable thin client on more computers than you have licenses. (If not all computers require the
license at the same time, you can enable and disable the option for the appropriate computers.)
To run the License program, click in this sequence: Start, Run, Programs, Secure Perfect, SP
License. The LicenseSetup window opens. Follow instructions as displayed. SP License has a separate
Online Help system.
Location Tab
Reference Topic:
Alarm Notifier
Person Form
Use this tab to enter location information for this person. The fields accept 64 alphanumeric characters,
making possible exceptionally lengthy street addresses or E-mail addresses.
Address1/Address2/ Address3/Address4/Address5
The labels of these five fields are defined on the Parameters Form.
Any fields can be used as an E-mail Address, but must first be designated as the E-mail address on
the Parameter Form, as a User Field or Address Field entry.
Telephone
Enter the telephone number of this person. You may use up to 14 alphanumeric characters. There are no
restrictions in format (whether you use hyphens, parentheses, or spaces). Enter in a format meaningful
and understandable to your organization or application.
Secure Perfect 6.1.1 User Manual 192
LogFile
Administration Menu
The LogFile option opens the LogFile Form that allows you to select the computer, name your log file,
and navigate to, or enter the path and directory to your LogFile.
LogFile Tab
Reference Topic:
Diagnostic Settings Form
LogFile Form
Click Add to create a new logfile record or Search to display a list box of previously created LogFiles.
Computer
This field will be unavailable when creating a new
record. The name of your computer will display in this
field.
LogFile
Name or identify your file.
You must enter an .spl extension. Example:
COM1log.spl
Path
Designate the path and directory in which to place
your LogFile.
Browse
Click to display a Browse for Folder window, allowing
you to navigate to the directory in which to place your
LogFile.
Save. Now, open the Diagnostic Settings Form from the Administration menu. You will want to select this
LogFile name from the list of files displayed, and assign components for monitoring.
Logoff
File Menu Item
Refer to Log On/Log Off or Shut Down.
Low-Battery Alarm
Micro/PX-2000 ONLY: When you create and save a Micro/PX-2000 record, Secure Perfect creates and
th
th
supports 11 DI points; however, the 11
DI is a low-battery alarm. To configure the 11
DI to function as
a low-battery alarm, refer to DI Board Records Creation. If power is off and the backup battery is running
low, the micro sends an alarm transaction to the Alarm Monitor form. The alarm displays until the battery
is reset by recharging or the micro is powered back on.
Secure Perfect 6.1.1 User Manual 193
M
Manual Control
Operations Menu
The Manual Control option opens the Manual Control Form that allows you to control:
• DO (digital output) states for Door DOs and other DOs.
• DI (digital input) states for Alarm DIs and other DIs.
• Intrusion Zone states.
The shortcut key combination for Manual Control Form is CTRL+O.
Clicking this icon from the Secure Perfect toolbar can also access this option:
Manual Control Tab
Digital Output Form
Use this tab to manually set the state of a specified digital output.
Purpose
Enter the reason for manually changing the state of the specified digital output. The text entered here is
recorded in Operator History.
Set state to:
• On for Duration: Click to set the selected digital output to its Active state for the On time
specified on the Digital Output tab.
• On Indefinite: Click to set the selected digital output to its Active state until it is manually set
to its inactive state. The only way to turn it off is by selecting Off on this tab or Off on the
Manual Door/DO Control Form.
• Off: Click to set the selected digital output to its inactive state.
• Sched. Override: Use this option to change the state of the DO if you want the schedule to
override its setting. For example, use Sched. Override to unlock a door if you want a
schedule at a later time to lock this door. If you don’t want the scheduler to lock your door,
use the On Indefinite selection.
Secure Perfect 6.1.1 User Manual 194
Mass Update
Reference Topic:
Conditions of Mass Update
This option is not available until at least one record exists in the list box to the right of the form. The Mass
Update mode allows you to simultaneously update properties on a group of records within Secure
Perfect. This is very helpful when a number of records for a single form require the identical property or
value change. Forms where Mass Update is applicable include the Person Form and Badge Form.
Click the Show me icon to view a step-by-step animated demo.
Mass Update mode of processing is enabled as follows:
1. Open a blank form.
2. Click Search to display a list of existing records. We recommend entering search criteria to
narrow your search results to only records that are to be updated. Records that match your
search criteria display in the list box to the right of the form.
If there are no records, Mass Update is not available.
3. Move the mouse pointer below any of the tabs and right-click to display a shortcut menu to
related forms. To enable the Mass Update mode, select Mass Update from the shortcut menu.
4. Note the change in the appearance of the form. ONLY those fields or dialog boxes that are
available for mass update changes are now enabled and blank. Certain conditions apply.
5. Select the records you want to adjust from the list box on the right. Typical Microsoft Windows
selection/deselection process is used in this application
6. Make the required adjustment to the form.
7. Click Save. The update of records begins immediately. A window displays with a progress bar,
indicating the update progress. Click Abort if you want to stop the update in progress.
You cannot close a form during the Mass Update process.
Right-click shortcut menu navigation is unavailable when you are in Mass Update
mode.
If you have changed any parameter but did not Save, a message reminds you to discard or
save your changes.
Smaller batch updates are recommended to prevent performance issues during a mass
update.
A Mass Update Complete dialog box displays, indicating completion or failure.
When mass updates are processed to an access right, a log file is generated and a
View Results key displays in the dialog box. Click to view the completion log. We
recommend that you rename and save this file to another location for reference purposes.
Renaming the log prevents an overwrite. The questionable log will be available for
Customer Support to review and locate discrepancies. Be aware that this log file is
automatically overwritten every 7 days, in order to prevent unnecessary data that would
accumulate on your hard drive.
8. When the process is complete, a Mass Update Complete dialog message displays.
9. Right-click and select Mass Update from the shortcut menu to disable and exit Mass Update
mode. The records refresh at this point.
10. Updates display in the list box to the right.
Secure Perfect 6.1.1 User Manual 195
Menu Buttons
View Menu
The Menu Buttons option determines whether or not the Secure Perfect graphics display beside options
in the drop-down menus.
Clear the check box to hide the graphics from view.
Message Format Tab
Alarm Notifier Form
This tab allows you to format the appearance of the e-mail alarm notification, based on your Windows
regional font settings.
Date/Time Format
Select a date/time format from the drop-down list.
Header
Select this check box to display a header greeting. In the Header field, enter text up to 256 alphanumeric
characters. This could be additional details explaining the alarm condition.
• If you do not select the check box, any header message you create will NOT be included in
your e-mail.
• If you do not enter a header greeting, an equivalent white space will display at the beginning
of the e-mail notification.
Footer
Select this check box to display a footer closing. In the Footer field, enter text up to 256 alphanumeric
characters. This space could provide a name and number to contact if the receiver has a question.
• If you do not select the check box, any footer message you create will NOT be included in
your e-mail.
• If you do not enter a foot or closing, an equivalent white space will display at the end of the e-
mail notification.
Alarm Information: The information displayed on the e-mail message may look similar to:
0151-1-01 DI|Alarm|10/16/02 15:20:59
where:
0151-1-01 DI = The micro, board and reader.
Alarm = The alarm state.
10/16/01 15:20:59 = The micro date and time.
Add Alarm Instruction
Select this check box to include the alarm instruction associated with this alarm, in this e-mail notification.
• If this check box is not selected, any associated alarm instruction will not be included in the
message.
• If this check box is selected and there are no alarm instructions, no instructions will be
included in the message.
Alarm/Reset Text
This text is how you want the alarm State to display to the receiver. You can do one of the following:
• Accept the default alarm state entry, as displayed in the language of the current operator.
• Select and replace the existing text with alarm state text in another language, such as the
language of the receiver. You can also add to the text with additional text (no more than 32
alphanumeric characters total) describing the state.
Alarm Text: Default alarm state text is Alarm, displayed in the language of the current operator.
Reset Text: Default alarm reset state text is Reset, displayed in the language of the current operator.
Secure Perfect 6.1.1 User Manual 196
Micro
Device Menu
The Micro option opens the Micro Form that allows you to identify and configure micros.
Micro/5-PX or Micro/PX-2000 Records Generation
When you select a micro type on the Micro Definition tab of the Micro Form, a Power/Comm board is
automatically added to the Configuration column on the Micro Configuration tab of the Micro Form. As a
result, certain additional records are created:
Alarm Records:
• Tamper
• Power
• Lost Badge Alarm
• Invalid Badge
• Host Comm Alarm
• 8RP Reminder: The Micro/PX-2000 supports 4 readers.
• 16DO Reminder: The Micro/PX-2000 supports 8 DO points.
• 20DI Reminder: The Micro/PX-2000 supports 11 DI points.
Micro/PX-2000 boards shipped after November 1, 2003, support the 11th DI as a low-battery
alarm for the micro.
None of these alarms are monitored. If you want them to display on the Alarm Monitor when the alarm is
triggered, you will need to go to the Alarm Form, Alarm Tab and enable Monitor in the Settings section.
In addition, all alarms are automatically assigned to Alarm Group 0. You can change the Alarm Group on
the Alarm Group Form.
Digital Input Records:
• Tamper
• Power
Sixteen (16) Alarm Group Records:
As mentioned above, all alarms are automatically assigned to Alarm Group 0. You can change this on the
Alarm Group Form.
Micro Assignment Dialog Box
This window displays when you click Edit, allowing you to select and assign micro association for this
form. Only micros in the operators’ facilities are available for assignment by this operator.
• Select, and then click the right arrow to assign an available micro.
• Select, and then click the left arrow to unassign a micro.
Secure Perfect 6.1.1 User Manual 197
Micro Configuration Tab
Reference Topics:
Micro/5-PX or Micro/PX-2000 Records Generation
Reader Board Records Generation
DO Board Records Generation
DI Board Records Generation
Micro Form
Use this tab to assign the appropriate boards to this micro.
Before continuing, verify that the micro type (Micro/5-PX, Micro/5-PXN, Micro/PX-2000, or Micro/PXN-
2000) is correct. The boards listed in the Boards column depend on the type of micro you have selected.
Boards
Lists all boards supported by Secure Perfect and the micro type you have selected. To add a board to the
current micro record, click and drag to the Configuration column. If the addition of the board violates a
micro configuration rule, you will get an error and the board will not be added.
Configuration
Lists the current configuration of the micro. A Power/Comm board is automatically added when you
create the micro record. The reader, digital input, and digital output boards will need to be added to
match the physical setup of the micro.
Following the addition or deletion of a board, you MUST click Save for the appropriate records to be
generated or deleted.
Once you add a board, you are restricted to that type of board only. For example, if you add one 2RP
board, any additional boards MUST be 2RP boards. Likewise, you cannot violate any micro configuration
rule. These are based on the capacities for each micro. For example, for the Micro/5-PX, you can only
add up to four 2RP boards, four 2SRP boards, two 4CRP boards, two 8RP boards, or two CK8RP
boards.
Secure Perfect 6.1.1 User Manual 198
Micro Definition Tab
Micro Form
Configure your system with forethought. You will need to designate a physical address for your micro
before you create a definition.
This tab contains the basic information on the micro, such as its address and connection type. When
configuring a micro, COMPLETE THIS TAB FIRST. Other tabs display, depending on the selections you
make on this form.
Upon creation, the micro is offline. Before the host will communicate with the micro, you must change it to
online using the Micro Utility Form. You will not see any badge or alarm transactions until this is done.
Element Description
Micro
Enter a number from 1 to 9999 maximum.
Address
When micro records are created, the default value is in the format:
mmmm-b-pp Board Type where mmmm represents the micro number to
which a reader is associated, b represents the board number, pp
represents the point or device number, and Board Type is the type of
reader board.
Example:
0001-1-01 Reader
Micro Type
Select the micro you are configuring from the drop-down list. Secure
Perfect operates with the following micro types:
• Micro/5-PX (supports 16 readers) for direct serial and remote dial-
up modem communications links.
• Micro/5-PXN (supports 16 readers) for 10/100Mb Ethernet
communications links. May also be used for direct serial and remote
dialup modem communication links.
• Micro/PX-2000 (supports 4 readers) for direct serial and remote
dial-up modem communications links.
• Micro/PXN-2000 (supports 4 readers) for 10/100Mb Ethernet
communications links. May also be used for direct serial and remote
dialup modem communication links.
• MicroPXNPlus (supports 16 readers) for 10/100Mb Ethernet
communications links. May also be used for direct serial and remote
dialup modem communication links.
• MicroPXNPlus2000 (supports 4 readers) for 10/100Mb Ethernet
communications links. May also be used for direct serial and remote
dialup modem communication links.
When you make a selection, the appropriate fields become available for
the selected type.
Head of Line
Once you have connected the first micro to the host, this micro is the
Head-of-Line in a string of micros.
• Select Yes if you are configuring the first micro connected to the
host.
• If you select No, you must also select a head-of-line micro from the
drop-down list.
A MicroPXNPlus or MicroPXNPlus2000 must be a head-of-line micro to
take advantage of the Web Integrated Configuration Tool for flashing the
firmware.
If this is a new board, the network settings are set as the default. Open a
browser window such as IE, enter the micro IP address (such as
http\\192.168.6.6) and click Go. Firmware download begins.
• If a MicroPXNPlus or MicroPXNPlus2000 is downstream, you must
use eFlash to download firmware to any micro.
Secure Perfect 6.1.1 User Manual 199
• If a MicroPXNPlus or MicroPXNPlus2000 is downstream, consider
obtaining a network connection and using the Web Integrated
Configuration Tool to individually download firmware for ALL
micros.
Connection
You must select a micro type before this field becomes available. An
Type
error message displays if the selected connection type is not valid with
the micro type.
• Select Dial-up if this micro is connected by a modem.
• Select Direct if a cable connects this micro.
• Select Network if this is a network micro connected by a network.
• Select Network + Dial-up if this is a network micro and has a
backup dial-up option. When the network connection is not
available, the host attempts to reach the micro via a dial-up modem.
• Select Network + Direct if this is a network micro. When the network
connection is not available, communication fails over to the
secondary direct connection and communication continues.
• Select Network + Network if this is a network micro. When the
network connection is not available, communication fails over to a
secondary network communication through another IP address,
assigned on the Port Settings tab.
Dial-Up and Network + Dial-Up Micros: If the host computer of this
micro is licensed for Client Redundancy and has assigned a backup
client, a dialog box displays, reminding you to complete the Client Form
by configuring telephone numbers for backup clients to reach this micro.
Host Keep
Type (or use the up and down arrows) the number of seconds that the
Alive
host will wait before sending the next message to a micro. Enter a
number between 10 and 3600. In general, you want a large number
when you have many micros on the same line or have a slow baud rate.
The default is 30 seconds and in most cases, it does not need to be
changed.
Host
Select the PC Name from the drop-down list. This is the host machine
Computer
that will communicate with the newly defined micro in the future and acts
as the micro communication server.
If the Default Hostname computer is in a failover condition, you cannot
re-assign this micro to any other Host computer except the Active Client
that is presently hosting this device.
Badge
Note that any time a badge that is not in a micro is presented to a
Loading
reader, it is reported as unknown and the host sends the badge to the
micro. This happens regardless of the Badge Loading option. The
micros can store only a limited number of badges. Refer to the
"Licensing Secure Perfect" chapter of the Secure Perfect Installation
Guide for capacities. When a previously unknown badge is sent to a
micro whose badge capacity is exceeded, the micro randomly chooses
a badge to delete to make room for the new badge. The badge is
deleted from the micro but not from the Secure Perfect system.
Select Force to force a download of all badges that can possibly gain
access to a reader on the micro.
Select Learn to allow the micro to "learn" the badges as they are
presented. For example, when a badge is presented to a reader and the
micro does not recognize the badge as valid, the micro communicates
with the host to confirm badge validity. If the badge is valid, the
information for that badge is downloaded to the micro; therefore, the
micro will acknowledge this badge as valid the next time the badge is
presented to the reader.
Secure Perfect 6.1.1 User Manual 200
Exit Request
Enable this field to increase the sense time on all the Exit DIs (exit
Debounce
requests). This field is useful if using noisy or chattering contact
interference in which you receive false exit requests.
Send Real
When this checkbox is selected, any digital output change-of-state is
Time Digital
reflected on the Alarm Graphics Viewer, in real-time status. This activity
Output
is also recorded in Digital Ouput History.
Status
Micro Flash and Micro Parameter Configuration
This dialog box displays only if the micro is online. There are three options:
• View/Edit Parameter Info
Micro Parameter – Direct/Dialup: This option is available for selection of a single micro. When
selected, the Micro Parameter Configuration screen displays and the configuration for the micro is
retrieved, allowing you to edit or change an existing setup such as micro address, IP address change,
or phone number changes. Once saved, the micro will reset and the new changes take effect.
If you change parameter block data through Secure Perfect, any Universal Badge Format (UBF)
data will be erased.
For example: If a M/5-PXN was originally configured as a direct serial micro during installation but
will now be a network micro, select the updated micro type and complete the network information.
Click OK. The micro will accept the changes, reset, then change the host information for this micro.
The Micro Parameter – Direct/Dialup tab allows you to change the connection type of the micro and
its Address, Idle Time, and DI res tolerance.
The Micro Parameter – Networking tab will display only if the system identified your micro as a
network micro and allows you to change the network parameters for the micro.
Micro Parameter – Badge Format: This tab opens to display the custom badge formats that are
currently in the micro. If there are no custom formats, the fields are empty. If a format in the database
does not match what is available in the micro, the window list displays a message ‘Unrecognized
Format.’ To change the badge format:
Magnetic stripe: Select the type of magnetic stripe format from the drop-down list.
Wiegand: Click Assign formats to display a list of available Wiegand badge formats from which
to choose and assign to this micro.
Clear formats in micro: Click to clear all custom badge formats from the micro. Badges
associated with those formats will no longer work.
If you change the badge format, any format that existed in the micro previously is replaced.
• Start Flashing Micro(s)
This option will start flashing the selected micro(s) with the latest firmware. A dialog box will display
asking you to verify your request. The flashing process takes approximately two to three minutes; it
varies with amount of data that needs to be transmitted to the micro.
• View/Edit Flash Files
Use this option ONLY when it is necessary to selectively flash an older version of firmware on a micro.
The Secure Perfect system automatically selects the latest version by default. The flashing process
takes approximately two to three minutes; it varies with amount of data that needs to be transmitted to
the micro. Click OK to begin the flash. When flashing is complete, the micro resets and requests a
database.
Micro/5 – PX and Micro/PX – 2000: The form opens with the latest .efl firmware file
displayed. Click the drop-down list to display and select an older firmware file.
Micro/5 – PXN and Micro/PXN – 2000: The form opens with the latest .efl network firmware
file displayed. Click the drop-down list to display and select an older network firmware file.
MicroPXNPlus and MicroPXNPlus2000: The form opens with the latest .efl network
firmware file displayed. Click the drop-down list to display and select an older network firmware
file.
Browse: Click to navigate to another media source or directory where firmware files reside.
Override Block Checking: Ignore this checkbox. This selection is for Customer Support use
only.
Secure Perfect 6.1.1 User Manual 201
Version 4.XX and later mico firmware is able to communicate with a Secure Perfect 6.x host and
continue to send alarm and badge transactions. Upgrading your system can be a seamless operation
without loss of data, time constraints during the micro migration process, or lockdowns during the
database upgrade process. However, in order to take advantage of the new features that are dependant
on the SP 6.x firmware, the ultimate goal is to bring all micros to current level as soon as possible
following the database upgrade.
Micro Utility
Operations Menu
The Micro Utility option opens the Micro Utility Form that allows you to monitor communications, control
the micro, and flash the micro. The shortcut key combination for the Micro Utility Form is CTRL+U.
Clicking this icon from the Secure Perfect toolbar can also access this option:
Secure Perfect 6.1.1 User Manual 202
Micro Utility Form Shortcut Menu
Reference Topic:
Flash Micro Icon
These options also display on the Micro Utility Form Toolbar. Refer to individual icons for additional
details of each function.
Select To
Edit
Open the Micro Form and edit the settings for the selected micro.
New
Open the Micro Form and create a new micro.
Set
Change the current state of the selected micro.
Offline/Offline
Download
Reload the badge database records for the selected micro.
Badges
Download
Download the micro’s database.
Database
Reset Micro
Physically reset the micro.
Reset T&A
Set the time and attendance status to neutral for all badges in this
micro.
Reset APB
Set the anti-passback status to neutral for all badges in this micro.
Dial/Hangup
Dial that micro immediately.
Micro
Flash Micro(s)
Click to open the Micro Flash & Micro Parameter Configuration
window that allows you to download the latest firmware to the
selected micro.
Version 4.XX and later firmware is able to communicate with a
Secure Perfect 6.0 host and continue to send alarm and badge
transactions. Upgrading your system can be a seamless operation
without loss of data, time constraints during the micro migration
process, or lockdowns during the database upgrade process.
However, in order to take advantage of the new features that are
dependant on the SP 6.0 firmware, the ultimate goal is to bring all
micros to current level as soon as possible following the database
upgrade. Also,
Remove Micro(s)
Remove the micro from the Micro Utility Form window.
Search Micros
Display the Search Criteria and Micro Selection dialog box.
Select Columns
Display the Select Columns dialog box.
Recall Micro
Refills the current form with the last search criteria. This is a toggle
Search
option.
Secure Perfect 6.1.1 User Manual 203
Micro Utility Form Toolbar
For a shortcut menu to functions available within the Micro Utility Form, select a micro from the list
and right-click.
For icon functionality on the Micro Utility Form toolbar:
Click To
Download the latest firmware to the selected micro. When the Micro Flash & Micro
Parameter Configuration dialog box displays, click Start Flashing Micro(s).
Open the Micro Form and edit the settings for the selected micro.
Open the Micro Form and create a new micro.
Change the current state of the selected micro.
Download badge records for the selected micro.
Download database to the micro.
Physically reset the micro.
Set the time and attendance status to neutral for all badges in this micro.
Set the anti-passback status to neutral for all badges in this micro.
Dial/hang up that micro immediately.
Display the Select Columns dialog box.
Display the Search Criteria and Micro Selection dialog box, allowing you to search and
select micros that you want to display on the Micro Utility Form.
The first time the form is opened when there is more than 64 micros, a message will
display informing you of the number of micros about to display and ask if you want to
select search criteria.
Mode Labels Tab
Reference Topics:
Event Schedule Form
Time Schedule Form
Mode Schedule Form
Parameters Form
Use this tab to change the labels of modes. These labels are used in scheduling. Refer to the Event,
Time, and Mode Schedule Forms.
Mode 1/Mode 2/Mode 3
The default label displays. To change the label, select and enter over the existing text, up to 30
alphanumeric characters.
Secure Perfect 6.1.1 User Manual 204
Mode Schedule
Administration Menu
The Mode Schedule option opens the Mode Schedule Form that allows you to define a mode and assign
the date and time the mode goes into effect.
Mode Schedule Tab
Reference Topic:
Mode Labels Tab
Mode Schedule Form
Use this tab to create a mode schedule.
• Time: The time displays in the format 00:00 (hours:minutes). Select and retype over
existing time.
• Date: Click the arrows to navigate through the months and years until the appropriate month
displays. Click the day on the calendar that this mode will begin.
• Assigned micros: Displays the currently assigned micros for this operator.
• Edit: Click to display the Micro Assignment dialog that allows you to add or change the
micros currently assigned. You must select all micros that this mode change will effect.
• From: Select the mode the system must be in for this schedule to occur.
• To: Select the mode the system will change to when this schedule occurs.
Like events, there is no end time associated with a mode. The mode will remain active until changed
by another mode schedule.
Mode schedules created on the Mode Schedule Form will display as schedule options on the Event
Schedule Form and Time Schedule Form.
Also, you can change the label of your modes on the Parameters Form, Mode Labels tab. (You must
restart the Secure Perfect program for any changes to the Parameters Form to take effect.)
Secure Perfect 6.1.1 User Manual 205
Mode Tab
Reference Topics:
Parameter Form
Mode Schedule Form
Overview – Micro Utility Form
Manual Control Form
Select all or individual micros or clients for immediate change of mode.
Example: The change of mode for micros is helpful for an immediate "lockdown" or to open all doors
immediately. The change of mode for clients applies to alarm routing and bumping.
When you select this tab, a windowpane displays a list of available online micros or client groups in your
system, based on facility permissions for the current operator.
Element Description
Select Display Type
• Micros: Select to display real time discription, current mode, and address of
online micros.
• Clients: Select to display real time current mode for configured Clients.
Set Mode to
From the drop-down list, select one of the available modes to which you want to
change.
• The Current Mode status, as displayed in the list, refreshes automatically
following a change of mode (by schedule or manual control).
• Updates for micros display in the Mode column of the Micro Utility Form.
• Updates for clients display on the Client Monitor Form.
Apply Mode
Click Apply Mode to send the command to the micro or client. Available modes
include Normal, Mode 1, Mode 2, and Mode 3. (Modes are created and
labeled on the Mode Labels tab of the Parameter Form.)
Purpose
Enter the reason for this change of mode. This box accepts 255 characters. This
comment is written to the operator history file and displays on the Operator
History Report.
Secure Perfect 6.1.1 User Manual 206
Multiple Language Support
Some items you should note about SP’s national language support:
• English is the default language and is always installed.
• The Windows operating system should be installed for the specific language chosen for SP. For
example, if running Secure Perfect Spanish, Windows Spanish should be installed.
• Secure Perfect will start in the language of the operating system. For example, if Windows Spanish is
installed, Secure Perfect will start in Spanish.
• Initially, there is only one operator provided with the system: an English language operator with the
login ID of secure and a password of master. The very first login to Secure Perfect MUST be done
under this operator. If the operating system is in a language other than English, there will be a slight
delay in bringing up the Secure Perfect main menu since the English help files must be copied into the
main directory.
• To set up a different language operator, you must go to the Operator Form, and add an operator with
the desired language. A combo box on the operator form lists the available languages for the system.
A language must be selected prior to saving the operator’s record.
• Multiple language logins are supported without having to restart the application. Log out of Secure
Perfect and log back in as the new operator. (There will be a slight delay in bringing up the Secure
Perfect main menu since the new language help files must be copied to the main directory.) Secure
Perfect along with the Help files will display in that operator’s language.
• Any data entry done after the operator’s login will be in the operator’s language. For example, when
adding a micro, all the attached device descriptions will be in the operator’s language.
• There are several areas in Secure Perfect that are not translated, such as certain Windows messages
and certain parts of the reporting functions.
• If a particular language is not provided by GE Security, the installation will take place in English and
the Secure Perfect application will run in English.
Secure Perfect 6.1.1 User Manual 207
N
Networking
Secure Perfect requires that you set up a network protocol to allow the server and clients to
communicate. Secure Perfect uses the TCP/IP network protocol.
You will need to validate visibility and connectivity to the client and servers by name resolution. (Secure
Perfect uses PC Names only.) The following describes two ways to validate operations:
• Envoking Ping: Select Start, then Run. At the Open field, type command. A DOS-like window opens.
At the prompt, type ping pcname where pcname is the name of the PC to which you are validating
visibility and connectivity. If you receive a response of an unknown host, you will need to re-examine
you TCP/IP configuration. If you receive a reply, the client/server is online and available for
connection.
• Start, Run, PC Name: Select Start, then Run. At the Open field, type //pcname where pcname is
the name of the PC to which you are validating connection. If the connection is valid, you will see the
shared folders on the remote PC.
If you are using Token Ring and/or TCP/IP, you are encouraged to contact your system administrator
for local requirements and restrictions.
New Icon
Micro Utility Form
Click this graphic to open the Micro Form and create a new micro:
New Record
File Menu Item
The New Record menu option creates a new record preloaded with default data. This is the best way to
start or add a new record as the default data often saves you from entering in the data. The New Record
option is available only when a form is open, contains records, and you have been given permission to
update records.
Clicking this icon on the Secure Perfect toolbar can also access this option:
New Template Dialog
Use this dialog box to create a new template. You are prompted to enter the name of the template you
want to create. Keep in mind that any information currently on the report form will be saved under this
name.
Next Pane
View Menu
The Next Pane option moves the cursor between the main form, the tabs, and the search results window,
if there is one.
Secure Perfect 6.1.1 User Manual 208
No Alarms on Alarm Monitor
Go to the Alarm Form and click the Alarm tab. Make sure that the Monitor option is On. Also, check the
schedules. There may be one in effect that does not route certain alarms to the Alarm Monitor Form.
No Floor Tracking
With this method, you define the floors available and define a digital output for each floor. Only digital
outputs (DOs) provided by the 16 DO board can be used. In addition, each DO may be used in only one
elevator and mapped to only one floor. The number of floors is limited by the number of 16 DO boards
that can be placed in the Micro/5-PX; the maximum is 4. Therefore, the maximum number of floors
available is 64 (4 boards x 16 DOs = 64 DOs).
No Readers in List Box
Only readers assigned Active will be displayed in the list box. Go to the Reader Form and click the
Reader tab. Verify that the readers you are using are assigned Active.
Normal Type Reader
Follow the steps below to shunt alarm groups within a micro connected to a normal reader.
1. Click the start key on the keypad. The start key is labeled with either an asterisk <*> or a plus <+>
depending on the reader model.
2. Type one of the following:
0 - to turn monitoring off
1 - to turn monitoring on
3. Type the alarm group number (00 to 15) you want shunted.
4. Click the end key which is labeled with either a pound sign (#) or an <x>.
5. Present a valid badge to the reader.
Notes
File Menu Item
The Notes menu option opens a text file, notes.txt, into which you can enter site-specific information.
The program used to edit this file is the program that has been associated with .txt files in Windows
(usually Notepad). The notes.txt file is saved to your desktop by default.
Secure Perfect 6.1.1 User Manual 209
O
Operations Menu Selections
The following selections display in the Operations drop-down menu:
Micro Utility
Activity Monitor
Alarm Monitor
Client Monitor
Digital Input Status
Alarm Graphics Editor
Alarm Graphics Viewer
Manual Control
Digital Output Status
Digital Video Viewer
Change Password
Select Facilities
Enable Alarm Video Pop-up
Operator
Administration Menu
The Operator option opens the Operator Form that allows you to set up individuals as users for the
Secure Perfect system and assign the facilities to which they have access.
Operator History
Reports Menu
The Operator History option opens the Operator History Report Form that allows you to create a report
based on the history of operator activity.
Secure Perfect 6.1.1 User Manual 210
Operator Tab
Reference Topics:
Permission Form
Multiple Language Support
Change Password
Password Tab
Operator Form
Use this form to create operator records that allow individuals to access the Secure Perfect program.
• Login ID: Assign and enter a login ID for this operator.
• Name: Enter the name of the operator.
• Permission: From the drop-down list of previously created permissions, assign a permission to ths
operator.
• Language: Click the drop-down list to display a list of available languages installed on your system.
Select the language with which this operator accesses and operates the Secure Perfect system.
Secure Perfect Password Authentication
• Password: Enter the password this operator will use to log in to Secure Perfect. This field accepts a
minimum of 1 and maximum of 20 digits. Additional password parameters were set on the Password
tab of the Parameter Form.
• Confirm Password: Enter the password a second time exactly as entered in the Password field.
IMPORTANT: The assigned password cannot match any previous five passwords. Operator login
passwords are case sensitive. Because it is difficult to retrieve, it is important for operators to
remember their assigned password or write it down and store in a safe place.
• Permission to Change Password: If this check box is selected, the operator indicated in this record
has the option to change the login password. If this checkbox is clear, the option to change the login
password is unavailable to this operator.
Expiration
• Password never expires: If selected, the password assigned to the current operator will never expire.
If this checkbox is not selected, the two remaining fields are available.
• Expires in (days): This field is not available if Password never expires is selected. From the drop-
down list of available time periods, select number of days that will pass before the password assigned
to the current operator expires. The selections are 30, 60, 90, 120, or 180 days.
• Warn prior to expiration (days): This field is not available if Password never expires is selected.
Enter or select the number of days before the expiration of the operator’s password that a warning
message displays, indicating that the assigned operator password is about to expire. The number of
days in this field must be less than the number of days selected in the Expires in (days) field.
When this option is selected, a message displays when logging in to Secure Perfect, informing the
operator of the number of days until the password expiration is valid.
- Select Yes to change the password immediately.
- Select No to continue using Secure Perfect and change the password at a later time.
- If the password has expired, the operator can no longer log on.
- If the operator does not have permission to change the password, the operator is instructed to
contact the SP Administrator to change the password. These warnings are logged as operator history
transactions and can be retrieved by running a report on operator actions, using the System Operator
filter for Login Name.
Secure Perfect 6.1.1 User Manual 211
Active Directory Password Authentication
If this option is available, Secure Perfect Password Authentication options will not be available. The
Active Directory domain controller authenticates this operator name and password. (The operator added
to Secure Perfect must be a valid operator in the domain computer.) The next time this operator logs in to
Secure Perfect, for this feature, the user must log in to the domain when logging into the computer, for
access to the Secure Perfect system. (The user cannot log in to the local computer; the user will log in to
the Domain.) Secure Perfect validates the user login ID and password against the specified Active
Directory, and not the Secure Perfect database. This authentication overrides any password parameters
entered through Secure Perfect.
• Browse: Click to display a list of Active Directory Domain Controller Servers. Select the Domain
Controller Server computer that will authenticathe the Secure Perfect operator, and controls the
users, passwords, and the Secure Perfect sytem to which you are assigning this operator. The
selected Server computer will authenticate this operator name and password. The selected Server
name now displays in this field.
Override
Administration Menu
The Override option opens the Override Form that allows an operator to configure persons and particular
readers for override, and generate Anti-Passback and Time and Attendance transactions that can be
added to history or archive databases.
Override Tab
Use this tab to set up the badge transaction that you want to enter into history.
Person: Select a person from the drop-down list.
Badge: Select a badge from the drop-down list of badges currently in the database.
The current time and date are displayed by default.
• Time: Enter a time.
• Date: Use the Calendar button to enter a date.
• Calendar: Click to display the Calendar dialog.
Reader Type: Select a reader type.
Reader: Select a reader from the drop-down list of available readers for assignment by the current
operator.
Update Micro: Enable this field if you want to send this transaction to the micro.
Database Selection:
Generate: Click this button to enter the transaction into history. Select either Secure Perfect History
database or Secure Perfect Archive database.
Secure Perfect 6.1.1 User Manual 212
P
Parameters
Administration Menu
The Parameters option opens the Parameters Form that allows you to establish settings for your entire
Secure Perfect system such as archive intervals and appropriate modems.
Password Tab - Parameter Form
Parameter Form
This tab allows you to select the parameters for passwords used on the Secure Perfect system.
• Minimum Length (characters): This field accepts 1 to 20 characters.
• Cannot begin with a numeric character
• Cannot end with a numeric character
• Must be mixed case (contain both upper and lower case characters)
• Must contain both alpha and numeric characters: If selected, this option enables the Minimum numeric
characters contol field.
• Minimum numeric characters: The range for this selection is 1 to 19 characters with at least 1 alpha
character.
If the current operator has permission to change their password, the parameters selected here display in
the Change Password window as reminders.
Pause Button
This option pauses or suspends the scrolling of badge transactions on the Activity Monitor Form.
Clicking this icon from the Activity Monitor Form toolbar will access this option:
PDF Files and Adobe Acrobat Reader
Portable Document Files (PDFs) are read-only electronic versions of printed documents. The Secure
Perfect documents are in PDF format and included on a separate document CD.
Adobe Acrobat Reader is required to view these documents. It is also included on the CD. If you do not
already have Adobe Acrobat Reader installed, follow the steps below:
1. Copy the file ar500enu.exe from CD-ROM onto your hard drive.
2. Navigate to Windows Explorer and double-click ar500enu.exe.
3. Follow the on-screen installation instructions.
To view the PDF file, double-click the file name or start Adobe Acrobat Reader and open the document
you want to view. For additional information, refer to Adobe Acrobat Reader online Help.
Secure Perfect 6.1.1 User Manual 213
People Assignment
This window displays a list of Person Records with an e-mail address in the Secure Perfect system. Only
person records in the operators’ facilities are available for assignment by this operator.
• Select, then click the right arrow to assign an available person.
• Select, then click the left arrow to unassign a person.
Permission
Administration Menu
The Permissions option opens the Permission Form that allows you to set access or right to use various
forms within your Secure Perfect system.
Permission Tab
Assigning a Level of Permission.
The forms in Secure Perfect will display an icon in the left corner indicating the permissions assigned
to this operator. The form icons correspond to the icons and permissions assigned here.
The information in Forms windowpane can be viewed one of two ways.
Forms
1. If a + displays to the left of the form name, then additional items are available. Click + to display
additional forms. You can also double-click the Forms: menu item to view the additional forms.
2. Right-click on the windowpane to display the shortcut menu with these options.
Show by Action lists the actions (None, Read, Update, All) followed by the forms assigned to
them.
Operator displays the Operator Form, which shows permissions assigned to existing
operators.
Actions
Four types of actions can be assigned:
None means that no access is given to that form.
Read means that read only access is given. The form and the associated records can be viewed
but not modified.
Update means that the records on that form can be viewed and modified.
All means that the records on that form can be viewed, modified and deleted.
Mixed is not an action to be assigned. It is used only on this form to signal that any forms beneath
a general title have different actions assigned.
Secure Perfect 6.1.1 User Manual 214
Example:
If you want an operator to monitor alarm and badge activity, select the Operation Forms, then set the
following actions:
• Select Activity Monitor, then select Read.
• Select Alarm Monitor, then select the action Read.
• Select Manual Control, then select Update. (Selecting Update for Manual Control allows the
operator to manually change the DO state.)
• Select Digital Output Status, then select Read.
On the Personnel Forms, set up actions to allow the new permission to add persons and badges into the
database.
• Select Person, then select Update
• Select Badge, then select Update.
For a shortcut menu to related forms, move the mouse pointer below the tab and click the right
mouse button.
Person
Personnel Menu
The Person option displays the Person Form that allows you to enter a person record into the system.
You will enter information such as the name and address, assign access rights for access control, assign
a department or user fields, and capture a photo. The shortcut key combination for Person Form is
CTRL+P.
Clicking this icon from the Secure Perfect toolbar can also access this option:
Person
Reports Menu
The Person option displays the Person Report Form that allows you to create a report on the people in
the database.
Person Selection Tab
Alarm Notifier Form
The Person Selection tab allows you to assign people available in this operators’ facility that will receive
an e-mail notification of the alarm/reset condition.
Assigned People:
Click Assign People to display the People Assignment window, allowing you to select specific people
that will receive an e-mail alarm notification.
Only those with an e-mail address in their Person Record will display in the People Assignment list for
assignment to an alarm notification.
Click OK and the selected people names will display in the Assigned People windowpane of the Person
Selection window.
Save the new or modified Alarm Notifier record before you exit the form.
Secure Perfect 6.1.1 User Manual 215
Personnel Menu Selections
The following selections display on the Personnel drop-down menu:
Person
Personnel Type
Department
Badge
Badge Design
Badge Alias
Access Right
Secure Perfect 6.1.1 User Manual 216
Personnel Tab
Reference Topic:
Settings Tab, Parameter Form
Person Form
Create a record of an employee’s personal information.
Only Last Name, Personnel Type, and Employee Number are required fields.
Field Action
First name
Enter the first name of the person.
Middle name 1
Enter the middle name of the person
Middle name 2
Enter an additional name, such as another middle name, of the person.
Initials, as displayed in the list box on the right, are the result of the
first letter of the First name and the first letter of each Middle name
entered.
Employee number
Enter a number assigned to and identifying this employee such as the
employee’s social security number. This is a required field and the
record will not save if the Empoyee number is left blank or if the number
is not unique to Secure Perfect. The field accepts up to 12 alphanumeric
characters.
CONVERSIONS ONLY: During the process of converting a
database, the system checks for possible blank or duplicate employee
numbers in the database. Results of this check display on the
Administration menu, Parameter Form. Open the form to display the
Settings tab:
• If the Enable unique & required Employee Number check box is
selected and unavailable, all converted Person records have unique
employee numbers. All future Person records must have a unique
employee number before the record can be saved.
• If the Enable unique & required Employee Number check box is NOT
selected, this is an indication that duplicate or blank employee
number records exist in the database.
At this time, you have the option to choose one of two preferences:
Do nothing and continue to allow blank or duplicate employee
numbers in Person records (the Enable unique & required
Emplyee Number check box remains clear).
OR
Set a control that requires all Person records to have an entry in
the Employee number field.
If you choose to require all Person records to have a unique
employee number, select Enable unique & required Employee
Number.
1. A message displays informing you: The Employee number
field on the Person Form will be required and unique. Once
this is enabled, it cannot be changed back. Do you want to
continue with this change? Click Yes.
2. A second message displays: Could not enable unique and
required Employee number. Duplicates already exist or field
is empty in the database. Refer to the Diagnostic Logfile.
Secure Perfect 6.1.1 User Manual 217
3. Navigate to the logfile. A message informs you that Secure
Perfect generated a text file and placed the file in the Logs folder
of the Secure Perfect Server. Navigate to
SecurePerfect\Logs\ DuplicateEmployeeNumbers.txt
file, consult the list of duplicate or blank employee numbers,
locate those Person records, and assign a unique employee
number to each.
4. When all records on the .txt file list have a unique employee
number, return to the Parameter Form, select the Enable unique
& required Employee Number check box, and Save. If you
cannot save and again receive additional messages, you must
repeat the steps above.
5. The selection to require all Person records to have a unique
employee number cannot be reversed and all newly added
Person records must have a unique employee number.
Personnel type
Select the appropriate personnel type from the drop-down list.
Department
Select the appropriate department from the drop-down list.
Trace activity
Select to enable this field if you want a record of all activity on this
badge. Each time this badge is used, a message displays on the Activity
Monitor and a record is written to the history database. If the system has
a printer association, the message is printed. This field overrides the
routing of activity as defined on the Reader Form.
We do not recommend activating the trace function at a site that
uses dial-up micros. A micro will dial the host whenever a traced badge
is read. This may incur additional telephone costs.
Extended Unlock
Select to enable this field. This person is now allowed extra time to gain
Time
access to an entry or exit point in the Secure Perfect system. A popup
message asks you if you want to change all associated Badge records
to follow Extended Unlock Time. If you select Yes, all badges for that
person are changed to Follow Extended Unlock Time, as configured on
the Door Functions tab of the Reader Form.
Example: An extended time limit can be configured for an employee
who enters a motorized door by wheelchair.
Find and Assign
Click to find the next badge presented to a selected reader. Select any
Badge
active reader. If the badge is not in Secure Perfect, you can add it. This
is a convenient way to assign badges.
Personnel Type
Personnel Menu
The Personnel Type option opens the Personnel Type Form that allows you to create groupings of
employees and assign a badge design to the personnel type.
Secure Perfect 6.1.1 User Manual 218
Personnel Type Tab
Personnel Type Form
Use this form to create personnel types and assign a default badge design to each personnel type. Click
Search to display a list of existing types. Three personnel types come standard with SP: Permanent,
Contractor, and Temporary. Click Add to create additional types of your own.
Description
Enter a basic description of the personnel type.
Badge Design
Select a default badge design from the drop-down list of available designs. The design you select will
print whenever badges are sent to the printer for people assigned the current personnel type.
Badge designs are created on the Badge Design Form. If you do not want the badge to imprint the
default design, the design can be changed when the badge is printed.
Secure Perfect 6.1.1 User Manual 219
Photo Tab
Reference Topic:
Image Capture Overview
Person Form
This tab allows you to capture images, assign badge design layouts, and print badges.
Field Action
Photo
If there is a photo associated with this person
record, it will display here.
Taken
Date this photo was captured.
Capture
Click to run the Capture program, allowing you to
Image/Signature
capture an image or signature of this person.
Badge
Displays the Descriptions of badges assigned to this
person, as assigned on the Badge Form.
If a printer is configured for your system, you can
select a badge to print.
Badge Design
Displays the name of the current badge design.
Click the drop-down list to select a different badge
design.
If there is a printer configured for your Secure
Perfect system, click to print a badge for this
person.
Signature
If there is a signature capture associated with this
person record, it will display here.
Point Assignment Dialog Box
This window displays when you click , enabling you to select and assign tour
points to a tour.
• Select, and then click the right arrow to assign an available point.
• Select, and then click the left arrow to unassign a point.
• A DI start point can exist in only one tour; therefore, any DIs previously assigned as Start
Tour Point in any tour, will not display in the list. The DI point cannot be re-used.
• All tour points must be associated with micros within the same Region.
• Tour points can be readers or DIs that are not on a dial-up micro:
1) If a reader is selected as the start point, DIs not assigned to a tour, display in this list.
2) DI points can only be assigned to one tour.
3) Reader tour points can be assigned to any tour and any number of tours. A reader as a
tour point can be re-used.
• The number of points assigned to a tour is limited to 64.
• If any reader is assigned as a tour point, at least one badge must be assigned to the tour.
• If all tour points are DIs, you do not need to assign a badge to the tour.
Click OK to display the results in the Tour Points windowpane.
Secure Perfect 6.1.1 User Manual 220
Port Settings Tab
Micro Form
This tab displays only when you are configuring a micro type as direct-connect, network, network +
direct, or network + network micro type. Refer to the Connection type figure below:
Direct Configuration
COM port:
You will be able to change this setting ONLY if the micro connection type is direct-connect or network +
direct. Otherwise, this field is unavailable. From the drop-down list, select the COM port to which this
micro is connected. The system operates with the default setting of None if no port is designated.
NETWORK CONFIGURATION
Primary Network (you must complete ONE of the following two selections):
These fields are available ONLY if the micro is other than a direct-connect or dial-up micro.
IP Address: Select this option and then enter the IP address for network configuration.
Network Name: Select this option and then enter the network name for the micro that hosts this micro.
Secondary Network (you must complete ONE of the following two selections):
IP Address: Select this option and then enter the secondary IP address assigned for network + network
communications.
Network Name: Select this option and then enter the secondary network name for the micro that hosts
this micro.
Preset/Camera Selection
Select or change an already defined camera from the drop-down list, then select or change a Preset from
the Preset drop-down list. Click OK to display in the results in the Assigned Preset/Camera windowpane.
Secure Perfect 6.1.1 User Manual 221
Preset/Camera Tab
Event Trigger Form
This window enables you to assign camera(s) and their associated presets with an event. Up to four
cameras can be assigned per event trigger.
• Click Edit to display the Preset/Camera Selection window. You are able to edit an existing
Preset and Camera combination associated with this Event. This option is disabled if there
are no existing records.
• Click Add to select a camera and corresponding preset. The available presets for a camera
display after you select the camera. Click OK. The addition now displays in the Assigned
Preset/Camera box.
• Select then click Remove to remove a Preset and Camera combination from the list of
available combinations in the Assigned Preset/Camera box. This option is disabled if there
are no existing records.
Presets Tab
Camera Form
This tab is unavailable for fixed cameras. Presets are assignable to PTZ cameras only. Assign predefined
presets for the selected camera.
The Presets tab allows you to assign previously defined presets to a camera. (Presets must first be
defined on the Camera Preset Form.) Presets are assignable to only the PTZ cameras types.
Assigned Presets:
This windowpane displays a list of already assigned presets.
Assign Camera Presets: Click this button to display the Camera Preset Assignment dialog box. A list of
available camera presets displays, enabling you to select and assign or unassign one or more presets for
the selected camera.
When the Camera Preset Assignment form closes, the selected presets display in the Assigned Presets
windowpane. Click Save to save the selections.
Print Preview Report
File Menu
The Print Preview Report option allows you to preview before printing and is available only when a
Report Form is displaying. Following completion of all tabs and options on the Report Form, click to
preview a copy of your report. A printer must be added to your Secure Perfect system in order for this
feature to be available.
On the Preview Report screen, the Total: field represents the number of records in the database and
not the number of records that matched your search criteria. The zoom % value will always read 100%
regardless of the zoom used.
Clicking this icon from the Secure Perfect toolbar can also access the option:
Print Report
File Menu
The Print Report option allows you to send the current report to a defined printer. This option is available
only when a Report Form or Report is displaying.
Secure Perfect 6.1.1 User Manual 222
Print Setup
Reference Topics:
Print Setup Window
Installing the Printer Driver
File Menu
Select Print Setup to open the Print Setup Window, allowing you to select your printer, printer properties,
paper source, and orientation.
Print Setup
Select an available printer from the drop-down list and set properties.
Select paper size and source.
Select orientation as portrait or landscape.
If you are connecting to a network printer, click Network to navigate to the printer.
Secure Perfect 6.1.1 User Manual 223
R
Read and Keypad-Type Reader
Only reader board door inputs and 20DI board input points can be shunted from a keypad. (To
identify a reader board door input, look for a default description that follows this format: 0001-1-01
Reader. To identify a 20DI board input point, look for a default description that follows this format: 0001-
1-01 DI.)
Follow the steps below to shunt alarm groups within a micro connected to a keypad and badge reader:
1. Click the start key on the keypad. The start key is labeled with either an asterisk <*> or a plus <+>
depending on the reader model.
2. Type one of the following:
0 - to turn monitoring off
1 - to turn monitoring on
3. Type the alarm group number (00 to 15) you want shunted.
4. Click the end key that is labeled with either a pound sign (#) or an <x>.
5. Present a valid badge to the reader.
6. Click the start key on the keypad again.
7. Type your Personal Identification Number (PIN) on the keypad.
8. Click the end key (<#> or <x>).
Reader
Device Menu
The Reader option opens the Reader Form that allows you to modify records that are automatically
generated when you define a micro as well as configure door functions, routing, schedules, and events.
Reader Access
Reports Menu
The Reader Access option opens the Reader Access Report Form that allows you to create a report
based on persons in the Secure Perfect system that have access to any of the specified readers.
Reader Assignment
This window displays when you click Assign or Assign Readers, enabling you to select and assign a
reader association. Only readers in the operators’ facilities are available for assignment by this operator.
• Select, and then click the right arrow to assign an available reader.
• Select, and then click the left arrow to unassign a reader.
Click OK to display results in the Assigned Readers windowpane.
Secure Perfect 6.1.1 User Manual 224
Reader Board Records Generation
The reader boards listed in the Boards column on the Micro Configuration tab depend on the Micro Type
you selected on the Micro Definition tab of the Micro Form. When you add a reader board (2RP, 2SRP),
certain records are automatically created:
Reader records:
• If adding a 2RP or 2SRP board, two reader records are generated. By default, these readers
are active and able to accept badge transactions. Readers marked as Active count against
your reader limit.
Alarm records:
• An alarm record is generated for each reader record. If you selected Supervised when you
added the board, an additional alarm record is generated for each reader called Supervised
Reader. If you are adding a 2SRP board, you will receive an additional alarm record for each
reader called Supervised Exit.
• None of these alarms are monitored. If you want them to display on the Alarm Monitor when
the alarm is triggered, you will need to go to the Alarm Form, Alarm Tab and enable Monitor
in the Settings section.
• In addition, all alarms are automatically assigned to Alarm Group 0. To change this, go to the
Alarm Group Form.
Digital input records:
• A digital input record is generated for each reader record.
Digital output records:
• If you added a 2RP or 2SRP board, a digital output record called Aux DO is generated for
each reader record. (There are 2 DO relays available on a 2RP board.)
Reader Button
This option displays a reader assignment dialog box allowing you to configure readers to be used with the
Swipe and Show program. If Imaging is not licensed for the system, this option is not available.
• Select, and then click the right arrow to assign an available reader.
• Select, and then click the left arrow to unassign a reader.
Clicking this icon from the Activity Monitor Form toolbar will access this option:
Secure Perfect 6.1.1 User Manual 225
Reader/Digital Output Tab
Manual Control Form
Manually lock or unlock doors and turn on or off DO (digital output) points, depending on the current
operator’s facilities and permissions.
Schedules override manual changes unless Indefinite Unlock has been selected. Micros will always
run schedules defined previously in its database. Therefore, if there was a schedule set to be in effect at
the current time, the manual change would be overridden and the schedule would be enforced.
Select micro
A micro must be selected before the system searches and displays results in the list box.
• All displays all the digital outputs of the type selected in the field Select DO type, found on all micros.
• By Micro displays all the digital outputs of the type selected in the field Select DO type, found on a
selected micro. Click the drop-down list to display a list of micros.
Select DO type
• If you select Reader, the windowpane displays the DO points available for the readers.
• If you select Other, the windowpane displays Aux DOs (the two 2 DO relays available on a 2RP
board) and other DO points. Example DO points include lights, sirens, and door strikes that may be
connected to the micro.
Columns in Windowpane
• Description: Description of the reader/DO in the database.
• Micro: Micro on which the reader/DO is located.
• On Time: Displays the On Time in the database. The On Time is the number of seconds this DO
remains in the active state when activated.
Set state to:
The names of the buttons change depending on the DO type (Reader or Other) selected.
If Reader is selected, click. . .
• Duration Unlock: To unlock the selected door for the time specified in the On Time column.
• Lock: To immediately lock the selected door.
• Indefinite Unlock: To unlock the selected door. It will remain unlocked until you manually lock it by
clicking lock.
• Sched. Override: To change the state of a door or DO, if you want a schedule to override its setting.
Example: Use Sched. Override to unlock a door if you want a schedule at a later time to lock this door.
If you don’t want the scheduler to lock your door, use the Indefinite Unlock selection.
If Other is selected, click. . .
• On For Duration: Activates the selected DO for the time specified in the On Time column.
• Off: Immediately deactivates the selected DO.
• On Indefinite: Activates the selected DO, which will remain active until you manually turn it off by
clicking Off.
• Sched. Override: Use this option to change the state of a DO if you want a schedule to override its
setting.
Purpose
Enter an explanation for locking/unlocking doors or activating/deactivating DO points. This field accepts
255 alphanumeric characters. These comments are written to the operator history file and display on the
Operator History Report, Purpose Field.
Secure Perfect 6.1.1 User Manual 226
Reader Tab
Reference Topics:
Read and Keypad-Type Reader
Keypad Only Type Reader
Normal Type Reader
Reader Form
This tab contains the basic information about the reader.
Element Description
Micro
This is a read-only field. The description of the micro that controls this reader.
Board
This is a read-only field. The default description is in the format: mmmm-b Board
Type where mmmm represents the micro number to which this reader is associated, b
represents the board number, and Board Type represents the reader board.
For example, 0001—1 8RP would be the reader on micro one, 8RP board one.
Number
This is a read-only field. The number of the reader (For a Micro/5-PX: 1 to 16; for a
Micro/PX-2000: 1 to 4). The number corresponds to where the reader is connected on
the micro. See the Micro/5 Installation Guide or Micro/PX-2000 and Micro/PXN-2000
Installation Guide for more information.
Model
There are three options; select:
• CASI-RUSCO Supervised if using a CASI-RUSCO supervised reader such as the
94x or 97x series proximity readers set for supervised F/2F.
• CASI-RUSCO 440/445 if using a CASI-RUSCO Model 440, Model 445, or Model
910.
• Other if using a reader that does not fit into the above categories.
Status Online: This field is automatically enabled when this reader record is created. An
online reader will accept a valid card read and unlock a door, provided it is one of the
licensed active readers. You also have the option to schedule a reader off-line. When
the reader is off-line, the reader will not accept valid card reads, will not unlock a door,
and transactions display on the Activity Monitor as Invalid.
Active: This field is automatically selected and allows the accepting of badge
transactions when this reader record is created. The number of active readers counts
against your reader limit, as defined by your software license. For example, if your
license key allows the use of 64 readers, you may have only 64 readers marked as
Active.
Physical
Normal: This reader requires only a valid badge to gain access.
type
Badge and Keypad: This reader requires a valid badge and a valid number (PIN)
entered on the keypad to gain access.
Badge or Keypad: This reader requires you to enter either a valid badge number on
the keypad or a valid badge to gain access.
Logical type
• Normal: Allows as many successive accesses as needed, as long as the badge
is valid.
• APB in: Anti-passback in. This type of reader (which gives an IN status) is used
to enter an area. This reader will not release a door a second time until that
badge is presented to an APB out reader connected to the same micro or, if you
selected Enable global APB on the Settings Tab of the Parameters Form, a
different micro. All micros are updated.
• APB out: Anti-passback out. This type of reader (which gives an OUT status) is
used to leave an area. This reader will not release a door a second time until that
badge is presented to an APB in reader connected to the same micro or, if you
selected Enable global APB on the Settings Tab of the Parameters Form, a
different micro. All micros are updated.
Secure Perfect Global Edition: You must configure this reader as APB if you
plan to include this reader in a Region APB configuration. Only designated APB
reader types display for selection on the Region Form.
Secure Perfect 6.1.1 User Manual 227
• T&A in: Time & Attendance in. This type of reader (which gives an IN status) is
used to enter an area. This reader will not release a door a second time until that
badge is presented to a T&A out reader connected to the same micro or, if you
selected Enable global T&A on the Settings Tab of the Parameters Form, a
different micro.
• T&A out: Time & Attendance out. This type of reader (which gives an OUT status)
is used to leave an area. This reader will not release a door a second time until
that badge is presented to a T&A in reader connected to the same micro or, if you
selected Enable global T&A on the Settings Tab of the Parameters Form, a
different micro.
• In required: This type of reader will open the door only if the badge presented
currently has an IN status. For example, if you had a badge with a status of OUT
and attempted to gain access through a reader that was marked as In required,
the door would not open.
• Elevator: This type of reader is used for elevator control. This is set up using the
Elevator Tab of the Elevator Form.
• T&A In/Out: Time & Attendance In/Out. This type of reader is used ONLY for
Wiegand Swipe Readers, such as the Model 100.
To get an IN status, hold the badge so that the front of the badge is facing you.
(The logo is usually printed on the front of the badge.) Then swipe the badge
through the reader.
To get an OUT status, turn the badge around so that the back of the badge is
now facing you. Swipe the badge through the reader.
• Passive APB and T&A: If you are using an anti-passback (APB) reader or time
APB and
and attendance (T&A) reader, enable this field for the reader to function as a
T&A
Normal type reader thereby allowing any valid badge to unlock the door
Settings
regardless of the badge’s IN/OUT status. However, the badge’s status will still be
logged as IN or OUT according to the reader used and will be recorded as such
in the badge history. Use this if you want to record APB or T&A without
preventing unauthorized persons from accessing doors.
Example: Timing begins when a badge is presented to an IN reader. Until that
time expires, the user cannot enter again regardless whether they went through
an OUT reader. If a user tries to go through the IN reader a second time, the
micro sends an invalid Timed APB message to the host.
Timed APB (min): This field is enabled when you select a Logical type as ‘APB
in.’ The default of this field is ‘0.’ Enter a number between 0 and 255.
• Max Invalid PIN Count: 1) Select this checkbox if you want your Secure Perfect
Keypad PIN
system to suspend badges after an invalid PIN is entered and a badge is
presented at a reader a configured number of times. 2) Then, enter a number
between 1 and 6 as the number of times an invalid PIN code is entered at a
system reader before the badge is suspended. The default of this field is ‘3.’ 3) If
suspended, the badge must be changed to active by a system administrator.
If the Parameter Form is set to grant access on duress, access will be granted
and the badge transaction will display as Valid Duress. If the Parameter Form is not
set to grant access on duress, the door will not open and the transaction will be
Invalid Duress. If set to monitor, an alarm will be generated in both instances.
Enable
Select this checkbox if you want your Secure Perfect system to notify you when a
‘Valid No
valid badge read occurs but the door did not open within the configured unlock time.
Passage’
This may be an indication of someone deciding not to pass through the door, or an
accidental read as someone passes a reader.
• This feature must be associated with an alarm type of door forced or door held in
order to be notified of a change in state of the door.
• In order to notify of a duress situation, Grant Access on Duress must be
configured.
Secure Perfect 6.1.1 User Manual 228
Reader Type Events Tab
Reader Form
Use this tab to select the events that will be used to determine when a reader will be used as a Normal,
Badge/Keypad, or Keypad reader.
Events define start time(s) and day(s) only. There is no end associated with an event. Therefore, that
event will stay in effect until another event changes it or you change it manually.
• Normal: Select an event from the drop-down list. This reader will then be used as a Normal
reader beginning at the time and day given by the event.
• Badge/keypad: Select an event from the drop-down list. This reader will then be used as a
Badge/keypad reader beginning at the time and day given by the event.
• Keypad: Select an event from the drop-down list. This reader will then be used as a Keypad
reader beginning at the time and day given by the event.
Readers Tab
Reference Topic:
Activity Monitoring Using the Activity Monitor Form
Event Trigger Form
Select reader(s) and transaction type(s) that will become the source for initiating the Event Trigger.
Assigned Readers:
This pane displays readers assigned to this Event Trigger record.
Element Description
Assign
Click to display a Reader Assignment window, enabling you to
Readers
select and assign a reader to this Event Trigger.
Transactions
Select any or all of the options as types of reader transactions to
trigger an event.
Valid
Invalid
Unknown
Lost
Tag Selection
Select one of the Tag options.
None (No tag is sent to the DVR for marking recorded video or
manipulating record rate.)
Tag only (A tag is sent to the DVR for marking recorded video at
the camera(s) current record rate.)
Tag as event (A tag is sent to the DVR for marking recorded
video and for changing the camera(s) record rate to its event
record rate settings.)
Secure Perfect 6.1.1 User Manual 229
Readers Tab - Reports
Reader Access Report or Roll Call Report
Use this tab to select specific readers that will form the basis of information for this report.
This windowpane displays the list of readers that currently apply to this report. If there are no readers
listed, click Edit to display a Reader Assignment dialog box, allowing you to select and add readers.
Readers Tab - Time and Attendance History Report Form
Use this tab to select the readers you would like to use for this report. The windowpane displays the list of
readers that currently apply to this report. If there are no readers listed, click Edit to display the Reader
Assignment dialog that allows you to add readers.
Recall Search
Search Menu
The Recall Search option refills the current form with the last search criteria data. Use this option when
you want to recall the last search criteria. The option does not conduct a search or affect any data in the
database. The Recall Search option is available only when a form that contains records is open.
Clicking this icon from the Secure Perfect toolbar can also access this option:
Recorded Video Currently Being Accessed
When attempting to retrieve a recorded video event from SP, you may receive this message. You will not
be able to access recorded video events while the DVR is currently serving another request for playback.
Records Generation
Reference Topics:
Micro/5 or Micro/PX-2000 Records Generation
Reader Board Records Generation
DI Board Records Generation
DO Board Records Generation
You can configure your micro record to match the micro’s physical board configuration. Only those
records that are needed are configured. Refer to the Reference Topics for details and lists of records
generated when the board/micro is added:
Secure Perfect 6.1.1 User Manual 230
Region
Reference Topic:
About Secure Perfect
Administration Menu
The Region option opens the Region Form that allows you to assign synchronization intervals for your
Global Edition database replication.
This option is unavailable if you are not licensed for Global Edition software.
Region Form Tab
Region Form
Use this tab to identify a Global Database Server or Regional Database Server, and configure
synchronization intervals. This tab also contains the licensing information about the Region.
Global Server
If the selected server name:
• Is a Global Database Server, a Yes displays in the Global Server field. Synchronization
interval fields are unavailable for input. You can assign synchronization intervals on Regional
Database Servers only.
• Is a Regional Database Server, a No displays in the Global Server field. Synchronization
interval fields are available for input.
The synchronization processing time is dependent on how much data needs to be
synchronized and the performance of your system.
Using Windows, we recommend that you synchronize time settings on the computers within
your Secure Perfect Global Edition system.
SP Database Synchronization Interval (min):
This database contains configuration data relating to badges and micros. The default and minium number
of minutes for synchronization of this database is every five minutes. The maximum number of minutes is
1440 (once per day).
SP History Database Synchronization Interval (min):
This database contains current history including badge transactions and operator history. The default and
minimum number of minutes for synchronization of this database is every five minutes. The maximum
number of minutes is 1440 (once per day).
REMINDER: A subscription is a request for a copy of data or database objects to be replicated. It
defines what publication will be received, where, and when. The time that it takes to complete this
process of replication and synchronization is dependent on the amount of data needed to be
synchronized.
License Info:
This list informs the operator of the current licensing capabilities of the selected Region.
Example: This information is helpful to an operator when attempting to add an additional feature to a
Region. A message may display, informing the operator that addition of the feature is in excess of the
license limit for that Region. The operator consults this form to review the license capabilities. If limits for
that feature have been reached, additional devices cannot be added at this time.
Secure Perfect 6.1.1 User Manual 231
Remove All Button
Alarm Monitor Form Toolbar
Click this icon on the toolbar to remove all alarms on the Alarm Monitor regardless of whether the alarms
are acknowledged or unacknowledged. An operator must have an ALL permission for the Alarm Monitor
in order to have access to this icon.
Remove Individual Button
Alarm Monitor Form Toolbar
Click this icon on the toolbar to remove one or more alarms without waiting for them to reset. The
alarm(s) can be unacknowledged and cleared as long as it was not defined on the Alarm Form as
requiring an acknowledgment. Select a series of alarms in sequence or individual alarms not in
sequence.
Replication and Synchronization Conflicts
Conflicts with Secure Perfect replication are rare but can occur. A conflict occurs whenever two users in
different regions simultaneously update a field on an individual record; or update a record at a Global
Database Server computer and a Regional Database Server computer during synchronization.
For example:
Region 1 revises an address from 4444 SW 8th St to 5544 SW 8th St.
Region 2 revises an address from 4444 SW 8th St to 6544 SW 8th St.
There are now two different values in the same field of the same records in two different regions. Each
region’s scheduled SQL Server Merge Agent will activate the merge process and the changes will be
sent to the Global Server.
• If both updates arrive at the Global Server during the same synchronization process, the SQL
Server will detect which update arrived first and that update will be successful.
• If the update at Region Two arrived before the update at Region One during the same
synchronization process, then Region Two’s update will be successful. The address will be
updated to 6544 SW 8th Street on both Region One and Region Two. Keep in mind that
conflicts can only occur during the same synchronization process.
• When the Global Server and Regional Server are connected and synchronization occurs, the
SQL Server Merge Agent detects conflicts and then determines which data will be accepted
and propagated to other sites based on the first record to successfully reach the Global
Server.
1. The synchronization processing time is dependent on how much data needs to be
synchronized and the performance of your system.
2. Using Windows, we recommend that you synchronize time settings on the computers within
your Secure Perfect Global Edition system.
3. When re-assigning devices such as micros or DVRs across regions, you must stop and
restart services, first on the original owner of the devices and then on the computer to which
the devices are newly assigned. You must allow sufficient time for data replication to
complete across all affected regions before restarting services on the newly assigned
computer. Verify that devices are online and operable following the re-assignment.
Secure Perfect 6.1.1 User Manual 232
Report Templates Window
Click the Show me icon to view a step-by-step animated demo.
A list box displays a list of available templates. To use, select the desired template and do one of the
following:
Close
Click to close this window without taking any action.
Save As
Select a template, and then click to save with a new name. A dialog box displays, enabling you to enter a
name for the new template.
Save
Select a template and click to save any changes made to the template parameters. An update message
will display.
Remove
Select a template, and then click to delete it from the list. A Delete Template dialog box displays to
confirm you choice and the template is deleted.
Make Default
Select a template, and then click to automatically load this template whenever this form is opened. A
Default Template confirmation message displays.
Secure Perfect 6.1.1 User Manual 233
Reports Menu Selections
The following selections display on the Reports drop-down menu:
Person
Badge
Administration
Device Configuration
Schedules/Events
Floor Access
Reader Access
Roll Call
Alarm History
Badge History
Zone History Report
DI History Report
Time and Attendance History
Operator History
Guard Tour History
External Reports
Reset Micro
This causes the micro to empty its database and stored history. When the reset is complete, the micro
will request a new database and, if it is configured for forced badge downloading, the micro will also
receive a new badge database.
Clicking this icon from the Micro Utility Form toolbar will access this option:
Response
Administration Menu
The Response option opens the Alarm Response Form that allows you to create a list of frequently used,
predefined responses to an alarm, and prevents the need of retyping an equivalent entry. The response
entries that you create will display on the Alarm Monitor Form.
Secure Perfect 6.1.1 User Manual 234
Restoring Secure Perfect Databases
Complete instructions for Restore functions are detailed in the Secure Perfect Installation Guide.
Restoring your databases depends on your system and how you performed your backups. The following
demonstrations are examples only.
Secure Perfect Enterprise Edition:
Click the Show me icon to view a step-by-step animated demo.
Secure Perfect Professional or eZ Edition:
If you have a backup of Secure Perfect databases, the data can be restored using the SP Maintenance
Utility.
Click the Show me icon to view a step-by-step animated demo.
Resume Button
This icon will be active only if you clicked Pause. All badge transactions that occurred while the Pause
option was on will be displayed, once you select resume.
Clicking this icon from the Activity Monitor Form toolbar will access this option:
Return Date Filter Tab
Badge Report
Use this tab to generate a report based on the return date of the badges.
• Do not filter badges by return date: Select this field if you do not want to use the expiration
date as a method of filtering the report information. This is equivalent to running a report on
badges for all return dates.
• Filter badges using this return date range: Select this field if you do want to use the return
date as a method of filtering the report information. If this is selected, you must select a
starting and ending date.
• Starting date: Click the start date you want for the starting range of badge return dates.
• Ending date: Click the ending date you want for the ending range of badge return dates.
Roll Call
Reports Menu
The Roll Call option opens the Roll Call Report Form that allows you to create a report based on
parameters selected for people who last entered a facility by way of a specified reader.
Secure Perfect 6.1.1 User Manual 235
Routing Schedule Tab
Reference Topic:
Activity Monitor Form
Reader Form
Use this tab to select the schedules that will be used to determine when valid transactions will be sent to
the history file, monitor, and/or printer. Time schedules define intervals which include a start AND an end
time for different days of the week and modes. At the start of the schedule, the routing of the transactions
changes to the scheduled value. At the end of the schedule, the routing of the transactions returns to the
nonscheduled value. For example, if valid transactions are scheduled to route to history, the transactions
will stop being routed to history at the end of the schedule.
Valid transactions to history
• Time schedule: Select a time schedule from the drop-down list.
• Yes/No: Select Yes if the above schedule is when you want valid transactions to be saved to
the history file or No if the above schedule is when you do not want valid transactions to be
saved to the history file.
Valid transactions to monitor
• Time schedule: Select a time schedule from the drop-down list.
• Yes/No: Select Yes if the above schedule is when you want valid transactions to be
displayed on the Activity Monitor Form or No if the above schedule is when you do not want
valid transactions to be displayed on the Activity Monitor Form.
Valid transactions to printer
• Time schedule: Select a time schedule from the drop-down list.
• Yes/No: Select Yes if the above schedule is when you want valid transactions to be sent to
the printer or No if the above schedule is when you do not want valid transactions to be sent
to the printer.
Secure Perfect 6.1.1 User Manual 236
Routing Tab
Reference Topic:
Parameters Form
Reader Form
Use this tab to define where transactions on the reader are sent. You have three options: badge history,
Activity Monitor, and a badge transaction printer. Badge transactions will print only if the transaction is
routed to the printer, the badge transaction printer is enabled, and a badge transaction printer is selected.
The enabling and selection of the badge transaction printer is done on the Parameters Form.
History
• Valid: Enable this field if you want valid badge transactions recorded in badge history.
• Invalid: Invalid badge transactions are always recorded in badge history. This default is a
read-only field and cannot be changed.
• Lost: Lost badge transactions are always recorded in badge history. This default is a read-
only field and cannot be changed.
Monitor:
• Valid: Enable this field if you want valid badge transactions to display on the Activity Monitor
Form.
• Invalid: Enable this field if you want invalid badge transactions to display on the Activity
Monitor Form.
• Lost: Enable this field if you want lost badge transactions to display on the Activity Monitor
Form.
Printer
• Valid: Enable this field if you want valid badge transactions to be sent to the badge
transaction printer.
• Invalid: Enable this field if you want invalid badge transactions to be sent to the badge
transaction printer.
• Lost: Enable this field if you want lost badge transactions to be sent to the badge transaction
printer.
Secure Perfect 6.1.1 User Manual 237
S
Save Record
File Menu Item
The Save Record menu option saves changes made to the current record into the database. Unsaved
entries are discarded. The Save Record option is available only when a form is open, and you have been
given permission to update records.
Clicking this icon on the Secure Perfect toolbar can also access this option:
Save Template As
File Menu
Select this option to create a new template and save under a new file name. This option is available only
when a Report Form is displaying.
Schedule Tab
Alarm Form
Use this tab to assign schedules for monitoring and printing alarms. Time schedules define intervals that
include a start AND an end time for different days of the week and modes. At the start of the schedule,
the alarm monitoring or printing changes to the scheduled value. At the end of the schedule, the alarm
monitoring or printing returns to the nonscheduled value. Example: If alarm monitoring is scheduled On,
it will return to 0ff (no monitoring) at the end of the assigned schedule.
Monitoring
• Time schedule: Click the drop-down list to select a time schedule.
• On/Off: Select On if the above schedule is when you want to monitor alarms or Off if the
above schedule is when you do not want to monitor alarms.
Print alarm
• Time schedule: Click the drop-down list to select a time schedule.
• Yes/No: Select Yes if the above schedule is when you want to print alarms or No if the above
schedule is when you do not want to print alarms.
Secure Perfect 6.1.1 User Manual 238
Schedule Tab
Digital Input Form
This tab is available only if you have selected Digital Output in the Type field on the Digital Input Tab.
Use this tab to assign a schedule. Time schedules define intervals which include a start AND an end time
for different days of the week and modes.
Time schedule
Click the drop-down list to select a previously created time schedule.
Enable/Disable
• Select Enable if you want to enable this digital input when this time schedule starts. Enabling
the digital input allows it to then trigger the associated digital output when a state change
occurs.
• Select Disable if you want to disable this digital input when this time schedule starts.
Disabling the digital input prevents the state change from being reported and the associated
digital output from triggering.
Schedule Tab
Digital Output Form
Use this tab to define schedules for turning digital outputs (DO) on or off. Time schedules define intervals
that include a start AND an end time for different days of the week and modes. At the start of the
schedule, the state of the DO changes to the scheduled value. At the end of the schedule, the state of
the DO returns to the nonscheduled value.
Example: If the DO is scheduled On, the DO will return to Off at the end of the schedule.
Turn DO On/Off
• Time Schedule: Select a time schedule from the drop-down list. This determines when the
DO will automatically turn on and off.
• On/Off: Select On if the above schedule is when you want the digital output to be in the
Active state or Off if the above schedule is when you do not want the digital output to be in
the Active state.
Schedule Tab
Digital Output Group Form
Use this tab to define schedules for turning all digital outputs in a selected digital output group on or off.
DO control
• Time schedule: Select a time schedule from the drop-down list.
• On/Off: Select On if the above schedule is when you want the digital outputs in the selected
digital output group to be in the Active state. Select Off if the above schedule is when you do
not want the digital outputs in the selected digital output group to be in the Active state.
Schedules/Events
Reports Menu
The Schedules/Events option opens the Schedule Report Form that allows you to create a report on the
schedules and events defined in the Secure Perfect system.
Secure Perfect 6.1.1 User Manual 239
Search
Search Menu
The Search option conducts a search in the database for all records that match the search criteria data
you enter in the form. The records found by the search are displayed in the search results window. Data
can be in any number of fields in the form or any number of tables.
Only records that match all fields in which data are entered are displayed. An asterisk (*) can be entered
in text boxes to indicate wildcard characters. The Search option is available only when a form that
contains records is open.
Example: Enter S* in an appropriate text box to display any records beginning with S. Example: A
search for badgeholders with the last name starting with Sm* would yield such names as Smith and
Smythers.
If no search data is entered, all records display. Any column displaying in the list box can be sorted by
clicking on the column heading.
Clicking this icon from the Secure Perfect toolbar can also access this option:
Search Menu Selections
The following selections display on the Search drop-down menu:
Clear Search
Recall Search
Search
Secure Perfect 6.1.1 User Manual 240
Secure Perfect Services
Reference Topic:
Log On/Log Off or Shut Down
Windows uses special programs called services. A service is a process that can start automatically when
the system boots and remains running as a background process independently of anyone being logged
in. It runs regardless of whether anyone is logged into Windows or SP. In other words, the computer must
be turned on but no one needs to be logged in. The SQL Server 2000 MUST be running for network
clients to connect and share the SQL database.
Secure Perfect has three services that run on all computers. Refer to your Secure Perfect Installation
Guide for additional information about services. The default Startup Type for services is set to Manual.
You are instructed to set the three services for an Automatic startup during the Secure Perfect installation
process, which means that they start as soon as the computer is started. Once set to Automatic, we
recommend that you do not change these settings.
1. Secure Perfect Diagnostics handles all diagnostics on all computers.
2. Secure Perfect Manager is the main service and handles micro communications and alarms.
3. Secure Perfect System Manager manages communication between computers and licensing.
Changing the state of services without a good working knowledge of the services purpose can cause
the computer to act erratically!
4. Secure Perfect API Service is used when using an API interface. This service is used when an
external system is sending or receiving transactions by way of Application Program Interface to
Secure Perfect. Do not start this service or change the settings unless you are using the API option in
Secure Perfect and have been previously licensed. This service can be started manually at the time
you install an API interface.
Services will automatically shut down when a client closes the Secure Perfect application and meets ALL
of the following criteria:
1. Does not host any micros or DVRs.
2. Does not have any API connections.
3. Is not a Thin Client.
4. Is not a backup client or have any backup clients of its own.
5. Is not a CCTV client.
6. Is not hosting a Guard Tour.
7. Client form Enable Auto Shutdown is selected.
The shutting down of a particular client computer designates that license capacity unused. Now, that
license is available for another computer that can now be designated a Secure Perfect client.
Secure Perfect 6.1.1 User Manual 241
Security Tab - Micro Form
Micro Form
Micro Passwords: The Micro Passwords list box has the following default password entries, enabling
four possible levels of security. Select a password; it now displays in the Password dialog box:
Select To
one-1
Re-assign a password by typing over the
default displayed in the dialog box.
two-1
Re-assign a password by typing over the
default displayed in the dialog box.
three-1
Re-assign a password by typing over the
default displayed in the dialog box.
four-1
Re-assign a password by typing over the
default displayed in the dialog box.
Click Change to save and re-assign the new password.
If you change your micro passwords, you must enter the changed passwords in FlashTool by typing
over the existing entries. As you type the password in FlashTool, the characters will be replaced by
asterisks (*) to ensure the security of the host access system.
Communication Encryption
This feature allows you to configure additional security encryption that scrambles data into an
unbreakable code for public transmission. Encryption protects the Host-to-micro exchange of information.
The Host uses the Exchange Key to send the Data Key to the micro. Once the Data Key is received, the
Host-to-micro communication is encrypted using that key.
Enable Encryption: This check box is available only for head-of-line network, network+dialup, network +
direct, and network + network micros.
This checkbox, and all selections in the Communication Encryption grouping, are not available on
downstream micros.
Exchange Key: There are two options for encrypting an Exchange Key.
• System: When you choose this selection, no additional selections are available or required.
This key is set at the factory.
• Custom: When you select this option, the three dialog boxes become available. At the micro,
enter the 48-character exchange key using FlashTool. This exchange key must be identical
to the key that was entered into the micro parameter block at the micro.
If the Custom exchange key entries do not match, an alarm condition indication displays
in the Reference column of the Alarm Monitor Form.
• Edit: Click to re-assign or revise an existing encrypted Custom exchange key for a selected
micro. It is possible to assign a duplicate exchange key on separate micros in your Secure
Perfect system. When you click this button one time, this button label changes to Auto
Generate.
• Auto Generate: Click this button to system-generate a Custom exchange key. We
recommend that you record this number. You can now enter this key into the micro
parameter block at the micro.
Secure Perfect 6.1.1 User Manual 242
Data Key: Secure Perfect supports two methods of data encryption standards: DES and DESIII.
• DES: When you select this method, only one dialog box is available for input. Enter 16
unique hex characters in this binary field. We recommend that you do not repeat any
character. The additional two dialog boxes are unavailable for entry.
• DES III: Enter 48 unique hex characters in the binary dialog boxes, in three 16-character
stirngs.
If you do not enter unique hex characters, this micro record will not save. An invalid field
message will display, informing you that the keys that were chosen are too weak.
• Edit: Click to re-assign or revise an existing encrypted data key for a selected micro. When
you click this button one time, this button label changes to Auto Generate.
• Auto Generate: Click this button to system-generate a data key. We recommend that you
record this number.
Select Columns
This option allows you to select columns that you want to display on the Micro Utility Form by putting a
check next to the column name. When you click OK, the selected columns are saved so you will not have
to select again the next time the form is opened.
If you are licensed for Client Redundancy, the column Default Hostname is available for selection. If
not licensed for Client Redundancy, this selection is unavailable.
Clicking this icon from the Micro Utility Form toolbar will access this option:
Select Criteria and Micro Selection
Clicking this icon from the Micro Utility Form toolbar will access this option:
This dialog box allows you to enter search criteria for available micros, from facilities to which you have
access, that you want to add to your view or remove from the list of displayed micros, based on the
results of the search criteria. Complete one or more of the search criterion.
Micro Description: Enter a micro description for which to search. You may use wildcard characters as
part of the search criteria.
Micro Address: Enter a micro address.
Online, Offline, Error: Select micros that meet the search criteria and are online, offline, or in an error
state.
Hostname: Select a host name.
Comm Port: Select a Comm Port.
Available Micros The micros are displayed that meet the search criteria and are not already selected to
be displayed in the Micro Utility Form.
Selected Micros: This box displays the results of the search. The list of micros are those that meet the
search criteria and are selected to be displayed.
Search: Click to display the micros as requested by the parameters you selected.
Clear Search: Clears the micro search criteria and selection parameters from the form windowpanes,
allowing you to selected new criteria.
Select Default Alarms
Select Default Alarms Dialog Box
This dialog box displays all alarms currently assigned to this map. To designate this map as the default
for an alarm, select each alarm that should have this map as its default association, which means this
map will display whenever you select this alarm point from the Alarm Monitor Form and open the Alarm
Graphics Viewer Form.
Secure Perfect 6.1.1 User Manual 243
Select Facilities
Operations Menu
The Select Facilities option opens the Set Active Facilities Form that allows you to change the facilities
currently in use.
Set As Default Template
File Menu
Use this option to select a template to use as the default template. This option is available only when a
Report Form is displaying with a loaded template. While the selected Report Form is displaying, select
Set As Default Template. A message displays stating the current template is now the default template
for this form. This template will automatically be loaded whenever you open this report form. You cannot
undo this election; however, you can later display and assign another report as the default.
Set Instruction Tab
Alarm Form
Use this tab to select the instructions you want to display on the Alarm Monitor Form when this alarm
occurs. Instructions are simply directions explaining how to react to the alarm.
Instruction
This windowpane displays the currently selected instructions in the order in which they will display on the
Alarm Monitor Form.
Move Up
Click to move a selected instruction up one line; it will display on the Alarm Monitor Form in the modified
order.
Move Down
Click to move a selected instruction down one line; it will display on the Alarm Monitor Form in the
modified order.
Edit
Click to display the Alarm Instruction Assignment dialog box that allows you to assign predefined
alarm instructions to this alarm.
Setting the Automatic Logoff Time
1. From the Administration menu, select Client.
2. In the Auto Logoff field, select a number between 1 and 99 to set the number of minutes of system
inactivity to elapse before an operator is automatically logged off. (Clicking the mouse button and
pressing keys on the keyboard is considered system activity; simply moving the mouse pointer is
not.)
3. To disable this feature, enter 0.
Secure Perfect 6.1.1 User Manual 244
Setting Up an Elevator
Do not switch between floor tracking and no floor tracking in the same elevator record. If you want to
change an existing record, delete that record and create a new one with the desired floor tracking
method.
1. Decide which method of elevator control you want to use: no floor tracking, floor tracking by input, or
floor tracking by keypad.
2. Set up a micro (along with the reader board(s) and the digital output board(s); if using the floor tracking
by input method, then also set up a digital input board).
• See information for setting up a direct-connect micro
• See information for setting up a dial-up micro
3. Set the desired readers to active using the Reader Tab of the Reader Form.
• See information for the Reader Tab, Reader Form.
4. Verify that the desired digital outputs are set up correctly. Also check the digital input setup if you are
using the floor tracking by input method.
5. Set up the floor descriptions using the Floor tab of the Floor Form.
6. Set up the elevator using the Elevator Form. Here you assign readers, digital outputs, and digital inputs
if using the floor tracking by input method.
Elevator control does not span micros. This means the reader, digital outputs, and digital inputs (if
applicable) MUST be on the same micro.
Settings Tab
Reference Topic:
Overview - Diagnostics
Diagnostic Setting Form
Enable debug messages: Select this box to enable monitoring for the selected diagnostic object.
Logfiles: Default and newly created LogFile names display in the Logfiles windowpane. Select a file
name from the list of files displayed, to which you are assigning this component for monitoring. By
assigning a component object to write to a particular logfile, you are removing that object from the list of
components that will write to the default logfile.
Save your new settings.
When you open the Diagnostic Viewer, the activities of your selected component will display in the logfile
to which it is assigned. (Those items with the COM # and Line # as part of the component name have the
highest effect on system performance and hard drive usage.)
After viewing, return to the Diagnostic Setting Form and disable the debug messages.
Secure Perfect 6.1.1 User Manual 245
Settings Tab
Parameters Form
Use this tab to set the general system settings.
Archive Database
Select an option to schedule archiving history. Archiving creates a copy of the latest history transactions,
leaving your history database empty. The default value for this option is Monthly. If you select:
• Daily: The archive is appended every day beginning at 11:59:58 P.M.
• Weekly: The archive is appended every week on the day that you select, beginning at 11:59:58
P.M. (You must select a day of the week.) Any change in the scheduling occurs immediately. For
example, if archiving is taking place on Tuesdays and the schedule is revised to archive on
Wednesday, the archiving will occur one day later, on Wednesday.
• Monthly: The archive is appended on the last day of the month beginning at 11:59:58 P.M.
The Secure Perfect services do NOT have to be running. Archiving will occur as long as SQL Server
Agent services are running.
Database Connection
This feature allows you to configure the amount of time that elapes before your Secure Perfect system
detects and advises you that your database is not accessable.
• Timeout (sec): The default is 30 seconds. The minimum is 3 seconds; the maximum is 120
seconds. 1) In a Secure Perfect Global Edition configuration, this is the amount of time until a
Regional failover begins. 2) In a typical Secure Perfect configuration, this is the amount of time
before Secure Perfect transactions are saved, Secure Perfect services shut down, and a
message advises you to repair your database.
• Retry: The default is 3 retries. The minimum is ‘0’; the maximum is 5 retries.
Photo Aspect Ratio: Select or enter a number for the height and the width. The aspect ratio controls the
relationship between the height and width of the photos. This setting controls the photos displayed in the
Capture program, on the Person Form, and in the Badge Designer program.
Console alarm sound:
• Continuous/Short: Select Continuous to sound a continuous tone when alarms are detected.
Select Short to sound a short tone when alarms are detected.
Enable global T&A: (Selected by default.) Select this check box if you want the entry status (either IN or
OUT) for all badges using Time and Attendance readers to be sent to and enforced by all micros.
Disabling the check box will require each micro to enforce T&A independently.
Enable global APB: (Selected by default.) Select this check box if you want the entry status (either IN or
OUT) for all badges using anti-passback readers to be sent to and enforced by all micros. Disabling the
check box will require each micro to enforce anti-passback on readers within each micro.
Enable unique & required Employee Number: (Selected and unavailable by default.) This checkbox is
only available after converting and upgrading a previous database. This feature enforces assignment of
unique and required Employee numbers for each Person record.
Grant Access on Duress: Select this check box to allow a door to open, and to signal a threatening
situation. With a valid access right and valid badge, a 1 + PIN code is entered at the reader. This
sequence generates a duress alarm that displays on the Alarm Monitor similar to the following: 0001-1-
01 Duress. The Activity Monitor displays activity type as Duress Activity. The default setting for
your system includes this feature already selected. Clear this checkbox if you do not want this feature.
Secure Perfect 6.1.1 User Manual 246
Alarm Notifier E-mail Support:
Enable: Select this check box to activate the e-mail notification option. The following e-mail dialog boxes
become available:
• To E-mail Address Field: Select a field name from the drop-down list that will be assigned as an
e-mail address. 1) Labels for these field names are assigned on the User Fields and Address
Fields tab of this form. 2) The content of each field is entered in the User Fields or Address fields
on the Person Form.
[Global Edition: To ensure successful e-mail alarm notification across regions in a Global Edition
system, the Global Database Server and all Regional Database Servers must have identical
configuration settings. That is: 1) For all Servers in your Global Edition system, the user field
selected for the ‘To E-mail Address Field’ must be identical. While configuring each Server, select
the field that represents the e-mail address from the drop-down list. 2) All other Alarm Notification
information is specific to the Regional Database Server.]
• SMTP E-mail Server: Enter the name of the server that handles the transfer of e-mail to and from
the e-mail addresses. This dialog box cannot be left blank and accepts up to 256 alphanumeric
characters.
• From E-mail Address: Enter an e-mail address of the account or person that is generating this
alarm notification such as spadmin@aol.com. This dialog box cannot be left blank and accepts up
to 64 alphanumeric characters.
• Allow Anonymous Access: This check box is selected by default, permitting the transmission of
an e-mail alarm notification without further authentication. The E-mail User Name and E-mail
Password dialog boxes are not available for entry and not required with default settings.
If the security requirements of the e-mail server require further authentication, clear the check box
to make available the dialog boxes for entry of an E-mail User Name and E-mail Password
E-mail User Name: Enter the user name that the e-mail server uses to validate this user. This
dialog box accepts up to 64 alphanumeric characters.
E-mail Password: Enter the user password that the e-mail server uses to validate this user. This
dialog box accepts up to 64 alphanumeric characters.
Save before you exit this form.
Settings to Reach Host Tab
Micro Form
This tab will display ONLY when you are setting up a dial-up, head-of-line micro. Use this tab to
configure how the micro dials the host.
Phone Numbers to Reach Host
Enter telephone numbers of up to 20 digits, that the micro dials to reach the host. If an outside line must
be accessed in order to dial out, type a comma after the number that accesses the outside line, (typically
9). In this situation, if the telephone number to be dialed is 1-555-666-7777, you would enter the number
in this field as follows: 9,15556667777
The micro will dial the number in Number 1: and then try the others in numerical order until connection it
made.
All Number fields must contain a telephone number of up to 20 digits. If there is only one telephone
number for this micro to reach the host, repeat this number in all fields. (If you click Save after completing
the first Number field, the system will automatically complete all Number fields with a duplicate number.)
Dial Interval
Select the interval (none, 1 hour, 8 hours, 12 hours and 24 hours) at which the micro will automatically
dial the host. The micro will dial at the bottom of the hour. For example, if you select the 1 hour interval,
the micro would dial at 4:30, 5:30 and continue every hour after.
Same Number Retries
Enter the number of times (from 0 to 9) the micro should redial the same telephone number before
moving on to the next available telephone number.
Secure Perfect 6.1.1 User Manual 247
Retry Interval (30 sec)
Enter the number (from 1 to 9) of 30-second intervals that the micro will wait in between each dial to the
host. For example, if you specify 2, then the micro will wait: 2 x 30 = 60 seconds between each dial to the
host.
Settings to Reach Micro Tab
Micro Form
This tab will display ONLY when you are configuring a dial-up, head-of-line micro. Use this tab to
configure how the host dials the micro.
Phone Numbers to Reach Micro
Enter the telephone number of up to 20 digits, that the host dials to call the micro. If an outside line must
be accessed in order to dial out, type a comma after the number that accesses the outside line, (typically
9). In this situation, if the telephone number to be dialed is 1-555-666-7777, enter the number in this field
as follows: 9,15556667777
The micro will first dial the number in Number 1: and then try the number in Number 2:.
All telephone number fields must contain a telephone number. If there is only one telephone number
for the micro, enter this number in all fields.
Dial Interval
Select the interval (None, 1 hour, 8 hours, 12 hours, 24 hours) at which the host will automatically dial the
micro. The host will dial one hour from the time the micro went into an idle (no activity) state. If this is a
new record, the count begins once the record is saved. If the Secure Perfect system is shut down, the
count begins once Secure Perfect is started.
Same Number Retries
Enter the number of times (from 0 to 9) the host should redial the same telephone number before moving
on to the next available telephone number.
Retry Interval (30 sec)
Enter the number (from 1 to 9) of 30-second intervals that the host will wait in between each dial to the
micro. For example, if you specify 2, then the host will wait: 2 x 30 = 60 seconds between each dial to the
host.
Host Call Back
Select this check box if you want the host computer to return a call back to the micro, providing additional
validation that the correct host-to-micro communication has taken place.
Show Me Demo Files
Reference Topic:
Index of Show Me Demo Files
If this graphic is displayed in a topic, click the Show me icon to view a step-by-step animated demo that
may assist you in performing the tasks described in the related fields. The demo files are in English only.
There is a short pause as the demo begins.
Sort Fields Dialog
This dialog box allows you to select fields by which to sort the information on a given report. The window
lists the fields available for the current report. If you want to sort by more than one field, hold the Control
key while you left-click the additional fields.
Secure Perfect 6.1.1 User Manual 248
Split
View Menu
The Split option allows you to increase or decrease the horizontal size of the tabs and windowpanes on a
form.
Status Bar
Reference Topic:
SP Taskbar
View Menu
Status Bar is a toggle option and determines whether or not you view the Secure Perfect status bar at
the bottom of your Secure Perfect screen. Clear the check box to hide the status bar from view. The
status bar displays the status of your Secure Perfect system, indicating the current operator,
communication port status, number of clients connected, number of alarms, and number of background
tasks.
The numbers indicate the total status of all active facilities assigned to the current operator.
Status Tab
Alarm Form
The Status tab provides the status of a selected alarm as stored in the micro’s database, such as its
sense time. This status reflects any changes made by schedules on this alarm and displays the date and
time of the last status.
• Alarm group: Displays the alarm group to which the alarm is assigned.
• Monitor: Displays whether this alarm is routed to the Alarm Monitor Form.
• Last status date: Displays the date on which the status was last requested.
• Last status time: Displays the time on which the status was last requested.
• Refresh: Click Refresh to receive the most current status from the micro. This may take
several moments.
A status refresh on an offline micro will never be returned.
Secure Perfect 6.1.1 User Manual 249
Status Tab - Badge Form
A badge record must be selected in order to enable this tab. This windowpane provides an immediate
status of the selected badge according to the information in the micro database.
This is a diagnostic tool. The status displayed here is verification that a badge modification has
actually taken place in the database, according to a change in the Status as modified on the Badge
Definition tab.
Requirements are indicated by an asterisk.
Element Description
Micro*
Select a micro from the drop-down list of available micros in facilities assigned to
this operator, and then click Status. The selected micro must be online in order
to display a Status windowpane conveying information about the selected badge.
Badge Status
Displays the current status according to the micro database.
APB Status
Displays the current Anti-Passback status.
TA Status
Displays the current Time and Attendance status.
Status*
Click to refresh or update changes that occurred since the last Status request.
Status Tab
Digital Input Form
Select this tab to display information about the digital input as stored in the micro’s database, such as its
sense time. Request the latest information by clicking Refresh. It may take a moment to process
refreshing the data.
A status refresh on a micro that is offline will never be returned.
Sense Time:
The sense time as of the last status date and time.
Enabled:
Yes/No - Whether the digital input is enabled or disabled as of the last status date and time.
Last status date:
The date on which the status was last requested.
Last status time:
The time that status was last requested.
Refresh
Click to receive the current status information for this digital input.
Secure Perfect 6.1.1 User Manual 250
Status Tab
Digital Input Status Form
Provides the status of the selected digital input according to the information in the micro database. You
can list the digital inputs for all micros or list the digital inputs per micro.
Select micro
• Select All to display the status for all digital inputs on all micros.
• Select By micro to display the status for all digital inputs on a selected micro. Click the drop-down
arrow to display a list of active micros.
Refresh
Click Refresh to get an updated status on the digital inputs. A refresh for a dial-up micro will cause the
host to dial the micro unless they are already connected. The refresh process may take a few minutes. A
reader and associated DIs are grouped together, by reader number.
A refresh selected for a micro that is offline or in error will never be returned.
Column Headings:
Number
Displays the number of the digital input assigned by the system.
Description
Displays the description of the digital input. (A reader and associated DIs are grouped together, by reader
number.)
Micro
Displays the number of the micro to which this digital input belongs.
State
Displays the state of the digital input as On, Off or Trouble.
• On means that the digital input point is in the Active state as defined on the Digital Input
Status Form.
• Off means that the digital input point is Inactive as defined on the Digital Input Status Form
• Trouble means that the digital input point has been cut or shorted.
Physical State
Displays the physical state of the digital input point.
• Open means that the contact is open.
• Closed means that the contact is closed.
• Cut means that the line has been cut.
• Short means that the line is shorted.
Date
Displays the date that the status was requested.
Time
Displays the time that the status was requested.
Secure Perfect 6.1.1 User Manual 251
Status Tab
Digital Output Status Form
This form displays the status of the selected digital outputs according to the information in the micro’s
database, by Reader DO or other DOs, by micro or for all micros.
Select DO Type
• Select Reader to display the DO points available for the readers.
• Select Other to display Aux DOs (the two DO relays available on a 2RP board) and other DO
points. Example DO points include lights, sirens, and door strikes that may be connected to
the micro.
Select Micro
• Select All to display the status for the digital outputs of the type selected in the field Select
DO type found on all micros.
• Select By Micro to display the status for digital outputs of the type selected in the field Select
DO type found on a selected micro. Click the drop-down list to display active micros.
Refresh
Click to get an updated status on the digital outputs. A refresh for a dial-up micro will cause the host to
dial the micro unless they are already connected. The refresh process may take a few minutes.
A refresh selected for an offline micro or micro in error will never be returned.
Column Descriptions:
• DO Number: Number of the digital output.
• Description: Description of the door/DO in the database.
• Micro: Number of the micro on which this digital output is found.
• Current State: Displays the state of the digital output.
• Date: Displays the date that the status was requested.
• Time: Displays the time that the status was requested.
If this is a reader DO, the states are:
• Lock: The door is locked.
• Unlock: The door is unlocked.
If this is any other DO, the states are:
• Active: The digital output is in the Active state defined on the Digital Output Form.
• Inactive: The digital output is NOT in the Active state.
Status Tab
Digital Video Recorder Form
Perform a search, select a DVR from the right pane of this form window, and click Status. The DVR must
be online in order to display a Status pane conveying the following information about the selected DVR:
• General Status: Current time, time powered on, MUX firmware, PPC firmware, and disk
capacity.
• Camera Status: Current in alarms and current in video loss alarms.
• Record Status: Record status, disk status, time recording, and time until disk is full.
• Archiving Status: Archive status, device status, time archiving, and time until archive is full.
• Ethernet Status: Normal connect IP address and connect priority, and live connect IP
address and connect priority.
A duplex recorder priority status displays on a line separate from the IP address.
A Triplex and/or Matrix recorder priority status displays as the last entry of the IP address
such as: 003.018.146.159/3
Click Status to refresh or update changes that occurred since the last Status request.
Secure Perfect 6.1.1 User Manual 252
Status Tab
Reference Topic:
Status Tab - Digital Input
Status Tab - Digital Output
Intrusion Zone Form
Perform a search, select an Intrusion Zone record from the right pane of this form window, and click
Status. This list box will display the status of all devices associated with this zone and status of the Zone.
• Reader Status: Online/offline
• Alarm Status: Monitored on/monitored off
• Zone Status: Armed/Disarmed.
• Digital Input: On/off/trouble
• Digital Output Status: Active/inactive
• Refresh: Click to refresh or update changes that occurred since the last status Refresh
request.
Status Tab - Micro Form
This tab allows you to quickly view the status of an individual micro.
The columns of the Micro Utility Form also reflect the status of the selected micro and explains what is
happening between the host and the micro.
Refresh: Click to update the data on this page. Depending on the size of your Secure Perfect system,
this may take some time. A status refresh can only be executed for on-line micros.
Encryption status for a head-of-line network + direct micro: If the micro loses network
connection and fails over to a direct connect, a configured Encryption status changes to None, since
Encryption is available for network micros only.
Secure Perfect 6.1.1 User Manual 253
Status Tab - Reader Form
Select this tab to view information about the reader as currently stored in the micro’s database, such as
its type and routing information. You can request the latest information by clicking Refresh. It may take a
moment to complete the refresh of the data.
Physical type: Displays the actual reader type: Normal, Badge and Keypad, and Badge or
Keypad.
Logical type: Displays the reader type this reader is being used as: Normal, APB In (anti-passback In),
APB Out (anti-passback Out), T&A In (time & attendance in), T&A Out (time & attendance out), In
Required, and Elevator.
Online status: Displays Online if the reader is currently online and Offline if the reader is currently
offline.
Routing for valid transactions
• History: Whether valid transactions are being routed to history.
• Monitor: Whether valid transactions are being routed to the Activity Monitor Form.
• Printer: Whether valid transactions are being routed to the printer.
Active Access Rights: Click to display a list of access rights that are currently active on the reader.
Last status date: Displays the date when the status was last requested.
Last status time: Displays the time when the status was last requested.
Refresh
Click to receive the current status information for this reader from the micro. A refresh for a dial-up micro
will cause the host to dial the micro unless they are already connected. The refresh process may take a
few minutes.
A status refresh requested for a micro that is offline or in error will never be returned.
Supervised DI Points on 2SRP Board Not Working
Check the board addresses on the reader boards in your micro. They must be consecutively numbered.
This means that the first reader board must be set to Address 1, the second reader board must be set to
Address 2 and so on.
Swipe and Show Button
Clicking this icon from the Activity Monitor Form toolbar will access the Swipe and Show program:
Secure Perfect 6.1.1 User Manual 254
Swipe and Show Option
Only one instance of Swipe and Show is available for display on a computer at one time. If readers
have not been selected, the program will not start. If Imaging is not licensed for the system, this option is
not available.
The Swipe and Show program is a monitoring and validation option, available on the Activity Monitor
Form. When properly configured and following a badge transaction, the operator is able to observe a
badge photo and text description of the transaction in the Swipe and Show window. An operator is able to
monitor transactions and compare the photo ID to a live image.
The Swipe and Show window is set to a default size, cannot be resized, and displays the following:
Element
Description
Photo
A photo displays in this windowpane for the badge presented to the reader. If
no photo is available or an unknown badge is presented to the reader, a
silhouette displays.
Name
First name, middle initial, and last name of badge holder.
Employee Number
Number assigned to this employee.
Department
Department where person is assigned.
Transaction Type
Valid (displays green), invalid (displays red), or unknown (displays gray)
messages display. Guard Tour activity types also display. See Activity
Monitoring Using the Activity Monitor Form for a listing of activity types.
Date/Time
Reader transaction date and time.
Reader Description
Description of reader where badge was presented.
Always on Top
Right-click the Swipe and Show title bar to display a shortcut option that
keeps the window in the forefront of all windows displaying on the Secure
Perfect workstation.
If you select another transaction, the window content changes to the available information for that
transaction. Close this window by selecting the window exit button, closing the Activity Monitor Form, or
closing the Secure Perfect client program.
Secure Perfect 6.1.1 User Manual 255
T
Takeover and Recovery Timing
Reference Topics:
Client Tab
Backup Clients Tab
Client device takeover occurs following communication breakdown between the default client and the
backup client, under the following circumstances:
1. If network problems should occur.
2. If a default client computer crashes.
3. Immediate takeover following normal shutdown, ignoring any other settings. This occurs if Secure
Perfect services are stopped and Perform Backup on Normal Shutdown is enabled on the Backup
Clients tab of the Client form.
When a backup client detects that the default client is offline, an approximate takeover timing can be
predicted using the following formula:
Ping Interval X Retry Count of Default Computer
+ Heartbeat Interval X Heartbeat Retry Count of Default Computer
+ Network Delays
All these values are configured on the Client form.
The values in this formula can be adjusted to achieve a shorter or longer takeover scenario.
Template - Defined
Reference Topics:
Save Template As
Set As Default Template
Create Default Template
Delete Template
The Template drop-down list on the Report forms displays the name of the currently loaded template, if
there is one. To load, select from the drop-down list of the available templates and load the details to the
form. Report templates are useful when you run a certain report frequently. After you select a report, it
can be saved as a template and revised by loading it from the template combo box.
Tile
Window Menu
This option allows you to control multiple window or forms. If you have several forms open but not visible,
select this option to view all forms at one time tiled side-by-side or one over the other on your display
monitor.
Secure Perfect 6.1.1 User Manual 256
Time and Attendance
Set the time and attendance status to neutral for all badges in this micro.
Clicking this icon from the Micro Utility Form toolbar will access this option:
Time and Attendance History
Reports Menu
The Time and Attendance History option opens the Time and Attendance History Report Form that
allows you to create a report based on the history of time and attendance activity and the parameters you
select.
Time Schedule
Administration Menu
The Time Schedule option opens the Time Schedule Form that allows you to define when an action will
begin and conclude on a daily or weekly basis. The schedules created here can be used many times in
controlling how the system works.
Time Schedules Tab
Time Schedule Form
The display time is in half-hour increments by default. To change the display increment, click and hold on
the right end of the bottom time bar, then move the cursor to the left until you are at the time increment
that you want. Then, click the desired time.
The time 00:00 is the same as 24:00 of the same day. For example, Saturday at 00:00 on the left side
of the chart is the same as 00:00 on the right side of the chart .
Use this tab to create a time schedule.
• Time chart: Click the desired start time and day of the week/mode and drag to the desired
stop time and day of the week/mode. This creates a bar that indicates that the time schedule
will occur during that time frame. Note that the current time schedule’s bar is selected.
Continue for each appropriate day that completes you new time schedule.
• Interval: Displays the number of the time schedule.
• New: Click to create a new time schedule.
• Delete: Click this button to delete a time schedule. You may delete a schedule that is
currently in effect. Refer to the note below.
Deleting a schedule does not affect the current state of any devices to which this schedule is
associated. Any devices currently under the effect of the deleted schedule will remain in that state until
changed manually or by another schedule.
• Interval details: The controls in this section are not needed in most circumstances. Use
details to verify that your selections match the calendar display.
Start time: Displays the time on which the time schedule will begin.
Stop time: Displays the time on which the time schedule will end.
Mode/day: Displays the mode or day on which the time schedule will occur.
You will need to assign this time schedule to a device such as a reader. Note the example below.
Secure Perfect 6.1.1 User Manual 257
Example:
1. On the Reader Form, select Building 1 Lobby Door reader record.
2. On the Functions Schedule tab, select a Door schedule BocaHQ Normal Workweek from the
drop-down list.
3. Select Unlock.
4. The result is that the reader will unlock the door based on the time schedule of BocaHQ Normal
Workweek.
Time Zone Tab
Micro Form
Select the time zone of this micro from the drop-down list of available time zones. The global map
graphics reflects the areas within that time zone. You can also use your mouse click-and-drag feature to
select and edit the time zone.
Toolbar
View Menu
The Toolbar option determines whether or not you view and access the Secure Perfect toolbar icons.
Clear the check box to hide the Toolbar from view.
Tour Point
Administration Menu
The Tour Point option opens the Tour Point Form that allows you to select a reader or digital input,
associated with pre-determined security inspection points by someone such as a security guard.
This option is unavailable if you are not licensed for Guard Tour.
Secure Perfect 6.1.1 User Manual 258
Tour Point Tab
Tour Point Form
A tour point can be a reader or digital input. You must select one option before you can save this point
record.
Element Description
Reader
If you selected Reader, this field is available. Select a
reader from the drop-down list of available readers.
When reader records are created, we recommend
that you keep the mmmm-b-pp prefix and add text to
the description field. A complete and accurate reader
description aids in assigning the reader points from this
drop-down list.
Digital Input
If you selected Digital Input, this field is available. Select a
digital input from the drop-down list of available digital
inputs.
When the digital input records are created, we
recommend that you keep the mmmm-b-pp prefix and add
text in the description field. A complete and accurate
digital input description aids in assigning alarm points
from this drop-down list.
Secure Perfect 6.1.1 User Manual 259
U
UL Certification
Secure Perfect is a UL-listed Grade A system (UL 1076 Grade A Proprietary Burglary Requirements/UL
294 Access Control Requirements). Your installation must adhere to the requirements listed in the
Certification section of the Secure Perfect Installation Manual, in order to qualify as UL-listed Grade A
certified.
User Fields Tab - Badge Form
Use this tab to enter user-defined information for the Badge Form record selected in the right
windowpane.
Modify Field
To give value to one of the fields, select a Label in the User Fields windowpane. Enter the value that you
want to display, corresponding to this label. This text box field accepts 32 alphanumeric characters.
User Fields
The existing list of labels and their values is listed in the User Fields windowpane. The selected label in
the User Fields windowpane is the label to which you are assigning a value.
Example:
The Badge User Field 1 was previously defined and labeled on the Parameters Form as Condition of
Badge. The first label listed here, in the User Fields windowpane, displays as Condition of Badge. Select
Condition of Badge. In the Modify Field dialog box, enter the corresponding condition of this badge as
Reported Lost by Badgeholder.
User Fields Tab
Parameters Form
Complete this tab to modify the labels for user fields. These labels are used on the Person Form and
Badge Form.
Person User Fields
Person User Fields Labels: Displays a list of 90 currently assigned labels for the Person Form user
fields.
New label: To assign or edit the label of a Person Form user field, select a label and enter the new or
edited text in this dialog box. The user field label can be up to 32 alphanumeric characters long.
Badge User Fields
Badge User Fields Labels: Displays a list of 20 currently assigned labels for the Badge Form user fields.
New label: To assign or edit the label of a Badge Form user field, select a label and enter the new or
edited text in this dialog box. The user field label can be up to 32 alphanumeric characters long.
Save before you exit this form.
Secure Perfect 6.1.1 User Manual 260
User Fields Tab
Person Form
Use this tab to enter user-defined information.
Modify Field
Enter the value for the currently selected User Field. This text box field accepts 32 alphanumeric
characters. User Fields are not appropriate for exceptionally lengthy street addresses or E-mail
addresses.
User Fields
The current user field Label and Value is listed in this windowpane. To give values to these fields, select
a Label.
Example:
The label for User Field 1 was previously defined on the Parameters Form as Social Security Number.
The first label listed in this windowpane displays as Social Security Number. Enter the corresponding
Social Security for this person record in the Modify Field text box.
Secure Perfect 6.1.1 User Manual 261
V
Video Display Tab
Reference Topic:
Video Windows - An Overview
Digital Video Recorder Form
Select this tab to set up your DVR video window display options. These options are configurable per DVR
and are intended for optimizing system performance based on your network bandwidth and computing
hardware. Secure Perfect can be configured to request and process video from DVRs in reduced
resolution and color for display purposes, while the video remains locally stored on the DVR in its original
recorded resolution and color settings. All video is transmitted over the network in a compressed Wavelet
format.
Resolution
From the drop-down list, select your video display resolution as Low (~12K per image), Medium (~20K
per image), or High (~28K per image).
Window Size
From the drop-down list, select a video window display size: Small (180 x 121); Medium (360 x 242); or
Large (720 x 484). Window sizes are to be selected based on achieving the best display quality for the
selected resolution. A medium window size with a medium resolution is an optimum selection for most
systems.
Black and White
Select if you choose to further reduce the size of images transmitted over the network for display
purposes. Video will display in black and white; however, the video remains locally stored on the DVR in
its original recorded resolution and color settings.
Max Search Time for Recorded Events (secs)
Enter number of seconds from the drop-down list. This selection is the length of time a search request for
recorded video will wait before timing out. Search times may vary depending on network traffic, DVR
processing load, and number of recorded events.
Video Standard
Select PAL or NTSC. PAL (Phase Alternating Line) is a European TV standard. NTSC (National TV
Standards Committee) is the U.S. TV standard administered by the FCC.
Password
Enter the same password, if any, that has been configured locally in the DVR for authenticating remote
network connectivity. This is not a required field and the default is no password.
Secure Perfect 6.1.1 User Manual 262
Video Driver Installation
After installation of the video adapter card, Windows will automatically detect the new video card on
power up. Follow the installation instructions received with your video driver software; then, reboot your
computer.
After your computer has rebooted, you will need to select your video resolution. A Secure Perfect
computer requires that you run in 1024 x 768 resolution. Choose 16-bit High Color minimum. To change
your video settings, follow the steps below:
1. Right-click the desktop and select Properties.
2. From the Display Properties window, select the Settings tab.
3. Select the desired video characteristics.
Once you have completed the installation of the video driver, now install the Video for Windows (AVI)
driver.
Video for Windows (AVI) Driver Installation
The Video for Windows driver must be installed to allow Secure Perfect to capture images. After you
have installed your video drivers, follow instructions included in your video system software to install the
Video for Windows driver.
Read any README file produced during installation.
This completes the installation.
Secure Perfect 6.1.1 User Manual 263
Video Windows - An Overview
When you open a live or recorded video window, the window size corresponds to the choice you selected
on the Video Display tab of the Digital Video Recorder Form. Each window displays a title bar identifying
the source of the video, the display, and a dialog box containing the current date and time. The minimize,
restore, maximize, and exit options display in the upper right corner of each window.
Resize Window
To resize a window, point to any window frame or corner border and drag a sizing handle to the size
window you want to display.
A resized window has a Restore option that restores the window size as it was prior to resizing.
Increasing the window size is limited to the size of your monitor screen.
Decreasing the window size is limited to the system default, corresponding to the Small option available
on the Video Display tab.
Shortcut Menu
Right-click anywhere on the video window to display a shortcut menu:
• Save Position: Each window can be independently moved anywhere on the desktop. Select
this option to save the position. If you close the window and reopen, the window opens at the
saved position. This feature has been incorporated to facilitate multi-window management for
both single and multi-monitor workstation configurations.
• Restore Window to Default Size: After resizing, select this option to return the window to
the default size corresponding to the choice you selected on the Video Display tab of the
Digital Video Recorder Form.
• Always On Top: Selection of this option keeps the window in the forefront of all windows
displaying on your Secure Perfect workstation.
• Save Picture As: When you select this option, an image of the display in the video window is
grabbed. The video continues to advance. An additional window opens for you to save the
captured image as a .JPG video file. The default file folder may display similar to the
following:
c:\Program Files\GE Interlogix\Secure Perfect\Video\untitled.jpg
(If this is a custom installation and the file shares were separated from the Secure
Application, the default video folder resides on the File Server.) If you choose, you can
navigate to another location and store the file. You can assign additional alphanumeric
characters to the file name to assist in identification. The following characters are not
permissable:
/ \ ? * < > | "
Click the Show me icon to view a step-by-step animated
demo.
Secure Perfect 6.1.1 User Manual 264
View Menu Selections
The following selections display on the View drop-down menu:
Toolbar
Status Bar
Menu Buttons
Split
Next Pane
Secure Perfect 6.1.1 User Manual 265
W
Weak Encryption Key
Weak encryption implies that the key could be unscrambled with a realistic amount of processing
capacity and within a reasonable amount of time.
In Secure Perfect, a message displays informing you that an assigned key is too weak and therefore,
invalid. Corrections must be made before the record can be saved. We recommend entering 48 unique
hex characters, in three 16-character strings. Do not repeat any character. Do not create a pattern.
Why a Host PC Dials a Micro
Whenever a change is made to a form that requires an update to the micro database, such as changes to
the Person Form, the host will dial the micro with the changes.
If you make many changes, the micro may go to idle between your changes causing a disconnection with
the host. Then, the host will need to dial the micro back to download the next change. You have two
options available to work around this situation:
1. Increase the idle time (found on the Parameters Form, Communication Settings tab) on the micro
that will give you more time to make the changes. Secure Perfect Server services must be
restarted for the changes to take effect.
2. Put the micro offline, make the changes and then put the micro online. The host will automatically
dial the micro and download the changes.
Why Can't I Delete a Record?
Some forms, such as the Digital Output Status Form and the Manual Control Form, do not contain a
Delete button because they display only status information. Other forms, such as the Reader Form,
Alarm Form, Alarm Group Form, Digital Output Form, and the Digital Output Group Form, also do not
contain a Delete button.
To keep the system stable, NO ONE is given permission to delete these records, not even a System
Administrator. These records are deleted when the associated micro is deleted. However, on other forms,
you may be assigned delete permission. If you can’t delete on those forms, you do not have permission
to delete.
Wiegand Badge Formats Dialog Box
Select from the Available list those badge formats that you want to assign to this micro. The maximum
number of formats that you can select is 8.
• Select, then click the right arrow to assign an available badge format.
• Select, then click the left arrow to unassign an available badge format.
Click OK to display the results in the Wiegand badge format windowpane.
Window Menu Selections
The following selections display on the Window drop-down menu:
Cascade
Tile
Arrange Icons
Secure Perfect 6.1.1 User Manual 266
Z
Zone History
Reports Menu
The Zone History option opens the Zone History Report Form that allows you to create a report based
on the history of intrusion zone transactions in the system.
Secure Perfect 6.1.1 User Manual 267