Packard Bell EN TM80 – page 10
Manual for Packard Bell EN TM80

Guard Tour Assignment Dialog Box
This window displays when you click Guard Tour Assignment, enabling you to select and assign Guard
Tours that you want to trigger an event.
• Select, and then click the right arrow to assign a Guard Tour.
• Select, and then click the left arrow to unassign a Guard Tour.
Click OK to display the results in the Assigned Guard Tours windowpane.
Group Tab
Digital Output Group Form
Use this tab to assign digital outputs to a selected digital output group on a specified micro.
Number
This is a read-only field displaying the number assigned to the digital output group.
Micro
This is a read-only field displaying the description of the micro on which this digital output group is
located.
Digital Outputs
This windowpane displays the digital outputs assigned to this group.
Assign Digital Outputs
Click this button to display the Digital Output Assignment dialog box. This dialog lists all digital outputs
available.
Guard Tour
Administration Menu
The Guard Tour option opens the Guard Tour form that allows you to enter a description for your Guard
Tour inspection and configure the Tour Manager PC, Start Point, tour time, and points.
This option is unavailable if you are not licensed for Guard Tour.
Guard Tour History
Reports Menu
The Guard Tour History option opens the Guard Tour History Report Form that allows you to generate a
report of completed tours displaying tour activities such as start points, hits, invalid points, pauses,
resumes, tour end points, tour time exceeded, manual start and manual stop.
Secure Perfect 6.1.1 User Manual 179

Guard Tour Tab - Guard Tour Form
Reference Topic:
Point Assignment Dialog Box
Badge Assignment Dialog Box
Configure the specifics of this tour by completing the elements displayed on this tab.
Requirements are indicated by an asterisk.
Element Description
Tour Host Computer*
From the drop-down list, select the computer that will host this tour. Guard
tours must be owned by a specific client host.
Start Tour Point*
From the drop-down list, select a tour point as the start point of this tour.
• Only direct and network micro devices display in this drop-down list.
• When you select a start point, becomes available.
• Enter the maximum number of minutes that this tour is allowed to last.
Max tour time (min)*
When the maximum time is reached, a tour is ended automatically.
• The default and maximum number of minutes in this field is 480.
Route Activity to
Select this check box to route badge activities to a selected and enabled
Printer
system printer at the client computer that is hosting the Guard Tour. You must
have two separate printers configured if you are using a printer for tour
activitiess and a printer for badges.
• Displays a list of assigned tour points. All tours are random. A random tour
Tour Points*
is a tour where all of its points do not need to be hit in a particular order,
except the assigned start point.
• Every time this tour is executed, the order of ‘hit’ points can vary. A random
tour ends automatically when all of its tour points have been hit.
• Click to display a Point Assignment dialog box, allowing you to assign Tour
Assign Tour Points*
Points to this tour.
• Selection results display in the Tour Points windowpane.
Move Up
Select and click to move this Tour Point up the list. This tour point order
displays on the Manual Control form, Guard Tour tab.
Move Down
Select and click to move this Tour Point down the list. This tour point order
displays on the Manual Control form, Guard Tour tab.
Tour Badges*
Displays a list of assigned tour badges. At least one badge must be assigned
to a tour.
• Click to display a Badge Assignment dialog box, allowing you to assign
Assign Tour Badges
badges to this tour.
• If a reader is assigned as a tour point, a badge must be assigned before
this Guard Tour record can be saved.
• Click to save this tour record and simultaneously create a new alarm,
Save*
Guard Tour Max Time Exceeded.
• If you have not completed the required elements, you cannot save.
Secure Perfect 6.1.1 User Manual 180

Guard Tour Tab - Manual Control Form
Reference Topics:
Guard Tours Form
Tour Point Form
This tab does not display if you are not licensed for Guard Tour.
The purpose of using this form is to manually start, pause, resume, or stop a Guard Tour that is currently
in progress. The upper windowpane displays all Guard Tours configured in your Secure Perfect system to
which this operator has access.
Element Description
Upper Windowpane:
• Guard Tour
A list of configured tours descriptions in the Secure Perfect system.
• Tour State
This column displays the current state of all Guard Tours in your Secure
Perfect system. Typical states are: 1) Tour Started; 2) Tour Not Started; 3)
Tour Paused.
• Time to Complete
This column displays the estimated time assigned for completion of a tour,
based on the clock time that this tour started and maximum tour time
allowed. If a tour is paused and later resumed before expiration of
estimated completion time, the remaining unused tour time is reflected in
the Time to Complete column.
• Client Description
This column displays the client that is hosting the selected tour. A color
indicator displays the current connection status of the client that is hosting
the selected tour.
• Green indicates online.
• Red indicates offline.
Lower Windowpane:
• Tour Point
This column displays a list of points associated with the selected Guard
Tour.
• Point Status
This column displays a ‘hit’ or ‘not hit’ real-time status. You do not have to
refresh your window to see the current state of the tour points for the
selected tour.
• Last Hit Time
This column has an entry following a valid ‘hit’ to this point.
Set Tour to:
• Start
Verify that the appropriate tour is selected in the upper windowpane. Click
to manually begin a Guard Tour. The Tour State column indicates ‘Tour
Started.’
• Stop
Verify that the appropriate tour is selected in the upper windowpane. Click
to prematurely stop a tour in progress. The Tour State column indicates
‘Tour Not Started.’ This button is not available if a tour is not in progress.
• Resume
Verify that the appropriate tour is selected in the upper windowpane. Click
to resume a tour that was previously paused. The Tour State column
indicates ‘Tour Started.’ This button is unavailable if a tour is not in
progress. This button is not available if the time assigned for the selected
tour has expired.
• Pause
Verify that the appropriate tour is selected in the upper windowpane. Click
to pause a tour that is currently in progress. The Tour State column
indicates ‘Tour Paused.’ This button is unavailable if a tour is not in
progress.
• Purpose
Specify a reason for stopping or starting this tour. Enter a brief statement
about the operator’s actions.
Secure Perfect 6.1.1 User Manual 181

Guard Tours Tab - Guard Tour History Report
Click Edit to display the Guard Tour Assignment Dialog Box, enabling you to assign Guard Tours for
which this report will generate.
The assigned Guard Tours display in the open window pane of this tab.
Secure Perfect 6.1.1 User Manual 182

H
Help Doesn't Display in My Assigned Language
This occurs when you are using either a non-English operating system or a non-English Secure Perfect
and you did not correctly shut down SP. To eliminate this problem, you MUST select the File menu and
then Exit to correctly shut down SP.
Help Topics
Help Menu
Selection of this option starts the Secure Perfect Help system.
You can also click the Help icon to access Help , then move the ? over any area of your display and
click again. A window will open with information pertaining to the selected section.
Click the Show me icon to view a step-by-step animated demo.
Using Help Contents
Using Help Index
Using Help Search
Hex Characters
Valid and allowable hex characters include the base 16 numbering system (0 through 9 and A through F).
How Do I Perform a Search on a Specific Form
The Secure Perfect Search button can be found on any form that provides search capabilities. If you click
this button when the current form is blank, all records will be returned. To specify criteria, fill in the
information.
Example: If you want to find all badgeholders with the last name Smith, type Smith in the Last name
field and click Search.
You can also use the * character that allows you to search for patterns.
Example: A search for badgeholders with the last name starting with Sm* would yield such names as
Smith and Smythers.
How Do I Put a Reader Online
From the Secure Perfect main menu, go to Device, then Reader. Click Search to display existing reader
records. From the right windowpane, select the reader you want to set online, then select Online and
Active.
Secure Perfect 6.1.1 User Manual 183

How Do I Remove an Alarm from the Alarm Monitor Form
When an alarm displays on the Alarm Monitor Form, appropriate action should be taken. For example,
you may want to send a guard out to check that a door is secure. Once the alarm has been investigated
and reset, if necessary, it should be removed from the Alarm Monitor Form.
1. Some alarms may require an acknowledgment before they can be removed. This feature is set on
the Alarm Form. To acknowledge the alarm:
Without a response, click Acknowledge and the Process state for that alarm will change to
Acknowledged.
With a response, click Responses to select a predefined response or enter your own in the
Response field. Then, click Acknowledge and the Process state for that alarm will change to
Acknowledged.
2. To remove an individual alarm without waiting for it to reset, highlight the alarm and click Remove
Individual.
3. If you have permission, you can remove all alarms in one action by clicking the Remove All icon:
How Do I Troubleshoot My Global Edition System?
Reference Topic:
Replication and Synchronization Conflicts
Review the Secure Perfect 6.0 Installation Guide chapter covering "Installing Secure Perfect 6.0 Global
Edition." Confirm and review your configuration options, then review the Troubleshooting section.
Additionally, refer to Microsoft Replication software documentation in printed and electronic format.
Secure Perfect 6.1.1 User Manual 184

I
Installing the Printer Driver
To install the print driver for your badge printer:
1. Follow the instructions shipped with your printer.
2. Select the appropriate printer port.
3. Select a name for the printer and indicate if it is the default printer.
4. Do not print a test page; click Finish.
5. After the installation is complete, move the mouse pointer over the printer icon, click the right
mouse button, and select and set Properties.
6. Complete the printer setup and then click Exit.
NOTES:
• The printer may NOT support transparent bitmaps.
• If the printer run out of cards or the ribbon need to be replaced while in the process of producing
badges, an error message will display. Correct the condition at the printer and then put the printer back
online before continuing with your print job.
Instruction
Administration Menu
The Instruction option opens the Alarm Instruction Form that allows you to create instructions on how to
react to alarms and link with alarm records. The instruction(s) will then display on the Alarm Monitor Form
when the alarm occurs.
Intrusion Zone
Administration Menu
The Intrusion Zone option opens the Intrusion Zone Form that allows you to create zones, assign
intrusion DI, intrusion DO, alarms, and readers. The Status Tab displays current state of the zone and
status of all assigned devices.
Intrusion Zone Assignment Dialog Box
This window displays when Assign Intrusion Zone is clicked on the Intrusion Zones tab of the Access
Right form or Event Trigger form. The window displays a list of all intrusion zones for the micros in the
facilities available for assignment by this operator. You can assign an unlimited number of intrusion zones
to an access right.
• Select, then click the right arrow to assign an available intrusion zone.
• Select, then click the left arrow to unassign an intrusion zone.
Click OK to accept the selections and display the Intrusion Zones in the Assigned Intrusion Zones list
box.
Secure Perfect 6.1.1 User Manual 185

Intrusion Overview
Reference Topics:
Arm/Disarm an Intrusion Zone
Intrusion Zone Form
Activity Monitor Form
About Intrusion Options
Intrusion functionality provides the ability to define local intrusion zones per micro that consist of:
• Readers
• Alarms
• Arm/disarm input point Intrusion DI
• Arm/disarm output point DO
The defined intrusion zones have the ability to be armed and disarmed through access control by using a
card and keypad reader, DI, or manual control.
The intended application is suited for arming and disarming intrusion zones from outside of the monitored
and secured areas. Based on Secure Perfect system architecture, it is not our intent to fully emulate
traditional Burg/Intrusion panel functions but to provide similar functionality for less stringent
Burg/intrusion requirements that can be taken on natively within the access control system. Additionally,
the system provides increased value by allowing cross-system functionality between the Secure Perfect
micro and vendor-independent Burg/Intrusion panels.
Arm/Disarm Intrusion Point - Digital Input Form
• An Intrusion DI Type has been added to the drop-down list on the Digital Input Form, Digital
Input tab.
• When the Arm/Disarm Intrusion point is set/active (Armed), the associated zone is armed by
placing all readers offline, all alarm points monitored on, and the arm/disarm DO goes active.
• When the Arm/Disarm Intrusion DI is reset/not active (Disarmed), the associated zone is
disarmed by placing all readers online, all alarm points monitored off (unless on a schedule),
and the arm/disarm DO goes inactive.
Intrusion Zone – Intrusion Zone Form
The Intrusion Zone Form is required for creating a relation between readers, alarm inputs, the
Arm/Disarm Intrusion point, and the arm/disarm DO.
1. An Intrusion Zone is defined with a description and facility assignment.
2. A micro selection is required to establish the zone source and its intrusion points.
3. The Intrusion Zone tab provides for the assignment of the following intrusion zone components:
arm/disarm DO, arm/disarm Intrusion DI, readers, and alarms.
Arm/Disarm Intrusion DI: This is a single record selection from a drop-down list filtered by
active facility that consists of all available Arm/Disarm Intrusion points for the micro. Only the
Dis that have not been assigned will be available.
Alarm Points: This is a multi-record selection from an assignment dialog filtered by active
facility that consists of available micro alarm points not already assigned to a zone. (24/7 4-
State Supervision rules apply regardless of the Armed/Disarmed state of the zone.)
Readers: This is a multi-record selection from an assignment dialog filtered by active facility
that consists of available readers not already assigned to a zone. (Readers must be active
and nonelevator type.)
A zone can be configured to contain the following:
An Arm/Disarm Intrusion Point with Alarm Points only and no Readers.
An Arm/Disarm Intrusion Point with Readers only and no Alarm Points
Alarm Points and Readers only with no Arm/Disarm Intrusion Point.
Readers only.
An arm/disarm DO can be assigned for any of these.
4. A Status tab provides the ability to request status of the zone and each of its associated points, as
follows.
Zone: Armed or Disarmed
Secure Perfect 6.1.1 User Manual 186

Arm/Disarm Intrusion DI: Active/Inactive/Trouble
Readers: Online or Off-Line
Alarm Points: Monitored Off/Monitored On
Arm/Disarm By Access Right
The Intrusion Zones tab of the Access Right Form allows you to assign multiple intrusion zones using an
assignment dialog.
• Only badge holders with an Intrusion Zone assigned on the Access Right Form will be able to
arm and disarm zones using any of the card/keypad readers within a zone.
• When a zone is armed, all readers within the zone will go offline, and normal access rights
will not gain access into the area.
• When a zone is disarmed, all readers within the zone will go on-line and normal access rights
will gain access into the area. If schedules were assigned, then the reader will follow the
schedule.
If you expect to arm/disarm by using any one of the readers within a zone:
• That reader must be assigned on the Access Right tab of the Access Right Form and be an
assigned reader in the Intrusion Zone listed on the Intrusion Zone tab.
OR
• Individually created access rights must be assigned to the person that will arm/disarm the
Instrusion Zone. (One right will allow access to the readers and another right will allow
access to the Intrusion Zone.)
Arm/Disarm by Manual Control
Manual zone control for arming and disarming is accomplished using the Intrusion Zone tab on the
Manual Control Form. This follows the standard Manual Control Form conventions including a Purpose
entry by the operator.
Intrusion Zone Tab
Reference Topic:
Intrusion Zone Form
Intrusion Zone Assignment Dialog Box
Access Right Form
This tab allows you to assign intrusion zone control to previously created access rights. Access to a
reader and access to an intrusion zone are two separate access rights. Only badge holders with an
Arm/Disarm Intrusion Zone access right will be able to arm and disarm zones by accessing a
card/keypad reader within a zone. When a zone is armed, all readers within that zone go off-line;
therefore, normal access rights will not gain access into the area.
Assigned Intrusion Zones: This windowpane displays a list of previously assigned intrusion zones for
the currently selected access right record.
Assign Intrusion Zone: Click this button to display the Intrusion Zone Assignment dialog box, allowing
you to assign and unassign intrusion zones to the selected access right. If no intrusion zones display,
verify that intrusion zones were configured on the Intrusion Zone Form.
If you do not have valid access to a reader that belongs to an Intrusion Zone due to a schedule in that
access right, you will not be able to arm/disarm a zone.
Secure Perfect 6.1.1 User Manual 187

Intrusion Zone Tab - Event Trigger Form
Reference Topic:
Intrusion Zone Assignment
This tab allows you to assign Intrusion Zones and Intrusion Zone transaction type(s) that will become the
source for this Event Trigger.
Element Description
Transactions:
Select any one or all of the types of Intrusion Zone
transactions that will trigger an event.
• Arm
Intrusion Zone arm transaction in progress.
• Disarm
Intrusion Zone disarm transaction in progress.
• Invalid
Intrusion Zone arm/disarm transaction failed for one of the
following reasons:
• Device or badging failed. The zones are not secure.
• The arm/disarm device is not a part of the selected
zones.
• The 10-second time period allowed for completion of
the arm/disarm process at keypad and reader, has
expired.
• The presented badge does not have access rights for
transactions in the selected Intrusion Zones.
Tag Selection:
Select one of the options.
• None
No tag is sent for marking a recorded video or
manipulating the record rate.
• Tag only
A tag is sent for marking recorded video at the camera(s)
current record rate.
• Tag as event
A tag is sent to the DVR for marking recorded video and
for changing the camera(s) record rate to its event record
rate settings.
Assigned
This list box displays those Intrusion Zones that you have
Intrusion Zones
assigned to this Event Trigger.
Assign Intrusion
Click to display an Intrusion Zone Assignment dialog box,
Zone
listing available Intrusion Zones in your Secure Perfect
system. Those zones selected and assigned when you
close the dialog box, will display in this list box.
Secure Perfect 6.1.1 User Manual 188

Intrusion Zone Tab
Reference Topic:
Arm/Disarm an Intrusion Zone
Intrusion Zone Form
This tab allows you to edit or create an intrusion zone record and associate DI, DO, and devices such as
readers and alarms in the operators’ selected facilities.
Number: Assign and enter a number for the intrusion zone, between 1 and 96. Duplicate numbers are
allowed but not on the same micro.
Micro:
Select a micro from the drop-down list of available micros that will control this intrusion zone. This is a
one-to-one relationship and establishes the zone source and intrusion/access points. The micro must be
connected and online.
A Reader or Digital Input and Alarm must be selected in order to save this record.
Arm/Disarm DO: Select one DO from the drop-down list of DOs that will trigger when an Intrusion Zone
is armed/disarmed. This is an optional assignment. This DO can be assigned to another Intrusion Zone.
Arm/Disarm DI: Select one DI for the drop-down list of available DIs of the Type Intrusion, as
assigned on the Digital Input Form. This DI can arm/disarm an Intrusion Zone and is an optional
assignment. This DI cannot be assigned to another Intrusion Zone.
When you unassign a DI, save this record. It is now available to re-assign this DI to another Intrusion
Zone.
Last Status:
• Date: Date of last zone history transaction on record.
• Time: Time of last zone history transaction on record.
• Status: Status as of last zone history transaction on record.
In order to refresh this status section, click off of this record then back or close then reopen the form
Devices
Assigned Readers: This list box displays a list of available, active readers in the same zone, belonging
to the selected micro. You must assign at least one reader OR a digital input and alarm to an Intrusion
Zone. The reader cannot be assigned to an elevator. Click Assign Readers to display a dialog box that
enables you to assign active readers.
Assigned Alarms: This list box displays a list of intrusion alarms in the same zone, not already
assigned, on the selected micro. This cannot be an external, DVMR, or a logical such as Host Comm or
Lost Badge alarm. Click Assign Alarms to display a dialog box that enables you to assign alarms. This is
an optional assignment.
Arm Delay (sec)
Arm Delay: Enter the number of seconds to delay the arming of this intrusion zone. This field accepts up
to 255 seconds. This time limit should allow a person to pass into or out of a monitored area before the
zone is armed.
If your system is UL-listed, the delay cannot exceed 60 seconds. Refer to the UL Certification
Requirements in your Secure Perfect Installation Manual.
Secure Perfect 6.1.1 User Manual 189

Intrusion Zone Tab
Reference Topic:
Intrusion Overview
Manual Control Form
This form allows you to manually control the Intrusion Zone, and takes the Intrusion Zone from one
condition (armed) to another condition (disarmed), depending on the current operator’s permissions.
Example:
• When the Zone is Armed, readers will not allow access to anyone, alarm points are
monitored, and schedules are ignored.
• When the Zone is Disarmed, personnel require only access rights for readers.
Select micro
Immediately following selection of a micro, the system searches and displays Intrusion Zone records in
the list box windowpane, associated with the selected micro.
• All displays all micros in the operator’s facilities.
• By Micro displays records for a specific micro. Click the down arrow to display the list of
micros.
Columns in Windowpane
• Description: Description of the Intrusion Zone in the database.
• Micro: Micro on which the Intrusion Zone Control is located.
Set State To:
• Arm: Immediately arms the selected Intrusion Zone.
• Disarm: Immediately disarms the manual Intrusion Zone.
Purpose
When you select an Intrusion record, this box is enabled. Enter an explanation for arming/disarming the
Intrusion Zone. This field accepts 255 alphanumeric characters. These comments are written to the
operator history file and display in the Purpose Field, on the Operator History Report.
Secure Perfect 6.1.1 User Manual 190

K
Keypad Alarm Shunting
Reference Topics:
Both Read/Keypad Type Reader
Keypad Only Type Reader
Normal Type Reader
The keypad alarm shunting feature allows you to turn the monitoring of a group of alarms off or on using
the keypad. This can also be accomplished by setting up a schedule for an alarm group using a time
schedule.
Only reader board door inputs and 20DI board input points can be shunted from a keypad.
• To identify a reader board door input, look for a default description that follows this format: 0001-1-01
Reader.
• To identify a 20DI board input point, look for a default description that follows this format: 0001-1-01
DI.
Keypad Only Type Reader
Only reader board door inputs and 20DI board input points can be shunted from a keypad. (To
identify a reader board door input, look for a default description that follows this format: 01-1-01 Reader.
To identify a 20DI board input point, look for a default description that follows this format: 01-1-01 DI.)
Follow the steps below to shunt alarm groups within a micro connected to a keypad reader.
1. Click the start key on the keypad. The start key is labeled with either an asterisk <*> or a plus <+>
depending on the reader model.
2. Type one of the following:
0 - to turn monitoring off
1 - to turn monitoring on
3. Type the alarm group number (00 to 15) you want shunted.
4. Click the end key that is labeled with either a pound sign (#) or an <x>.
5. Click the start key on the keypad again.
6. Type your badge number on the keypad.
7. Click the end key (<#> or <x>).
Secure Perfect 6.1.1 User Manual 191

L
Launch Client
Select this icon from the Client Monitor toolbar, to enable a CCTV interface (other than integrated CCTV).
This option also displays on the shortcut menu for this form. The shortcut menu displays when you click
the right mouse button.
Licensing
Reference Topic:
About Secure Perfect
Your Secure Perfect software is licensed during the installation process. The license sequence is also
an item on the Start, Programs, Secure Perfect menu. Refer to the SP License Help system for
additional details of the licensing procedure.
Your license included Imaging software for Secure Perfect that controls the number of clients that can
launch Imaging. Imaging installs with every Secure Perfect installation; however, you cannot enable
Imaging on more computers than you have Imaging licenses. (Only clients that have an Imaging license
enabled can capture images and signatures, create badge designs, and print badges. If not all computers
require the license at the same time, you can enable and disable the license for the appropriate
computers.)
Thin client licenses are limited to Enterprise Server computers running Windows 2000/2003 operating
system. Licensing controls the number of computers that can host remote Secure Perfect sessions. You
cannot enable thin client on more computers than you have licenses. (If not all computers require the
license at the same time, you can enable and disable the option for the appropriate computers.)
To run the License program, click in this sequence: Start, Run, Programs, Secure Perfect, SP
License. The LicenseSetup window opens. Follow instructions as displayed. SP License has a separate
Online Help system.
Location Tab
Reference Topic:
Alarm Notifier
Person Form
Use this tab to enter location information for this person. The fields accept 64 alphanumeric characters,
making possible exceptionally lengthy street addresses or E-mail addresses.
Address1/Address2/ Address3/Address4/Address5
The labels of these five fields are defined on the Parameters Form.
Any fields can be used as an E-mail Address, but must first be designated as the E-mail address on
the Parameter Form, as a User Field or Address Field entry.
Telephone
Enter the telephone number of this person. You may use up to 14 alphanumeric characters. There are no
restrictions in format (whether you use hyphens, parentheses, or spaces). Enter in a format meaningful
and understandable to your organization or application.
Secure Perfect 6.1.1 User Manual 192

LogFile
Administration Menu
The LogFile option opens the LogFile Form that allows you to select the computer, name your log file,
and navigate to, or enter the path and directory to your LogFile.
LogFile Tab
Reference Topic:
Diagnostic Settings Form
LogFile Form
Click Add to create a new logfile record or Search to display a list box of previously created LogFiles.
Computer
This field will be unavailable when creating a new
record. The name of your computer will display in this
field.
LogFile
Name or identify your file.
You must enter an .spl extension. Example:
COM1log.spl
Path
Designate the path and directory in which to place
your LogFile.
Browse
Click to display a Browse for Folder window, allowing
you to navigate to the directory in which to place your
LogFile.
Save. Now, open the Diagnostic Settings Form from the Administration menu. You will want to select this
LogFile name from the list of files displayed, and assign components for monitoring.
Logoff
File Menu Item
Refer to Log On/Log Off or Shut Down.
Low-Battery Alarm
Micro/PX-2000 ONLY: When you create and save a Micro/PX-2000 record, Secure Perfect creates and
th
th
supports 11 DI points; however, the 11
DI is a low-battery alarm. To configure the 11
DI to function as
a low-battery alarm, refer to DI Board Records Creation. If power is off and the backup battery is running
low, the micro sends an alarm transaction to the Alarm Monitor form. The alarm displays until the battery
is reset by recharging or the micro is powered back on.
Secure Perfect 6.1.1 User Manual 193

M
Manual Control
Operations Menu
The Manual Control option opens the Manual Control Form that allows you to control:
• DO (digital output) states for Door DOs and other DOs.
• DI (digital input) states for Alarm DIs and other DIs.
• Intrusion Zone states.
The shortcut key combination for Manual Control Form is CTRL+O.
Clicking this icon from the Secure Perfect toolbar can also access this option:
Manual Control Tab
Digital Output Form
Use this tab to manually set the state of a specified digital output.
Purpose
Enter the reason for manually changing the state of the specified digital output. The text entered here is
recorded in Operator History.
Set state to:
• On for Duration: Click to set the selected digital output to its Active state for the On time
specified on the Digital Output tab.
• On Indefinite: Click to set the selected digital output to its Active state until it is manually set
to its inactive state. The only way to turn it off is by selecting Off on this tab or Off on the
Manual Door/DO Control Form.
• Off: Click to set the selected digital output to its inactive state.
• Sched. Override: Use this option to change the state of the DO if you want the schedule to
override its setting. For example, use Sched. Override to unlock a door if you want a
schedule at a later time to lock this door. If you don’t want the scheduler to lock your door,
use the On Indefinite selection.
Secure Perfect 6.1.1 User Manual 194

Mass Update
Reference Topic:
Conditions of Mass Update
This option is not available until at least one record exists in the list box to the right of the form. The Mass
Update mode allows you to simultaneously update properties on a group of records within Secure
Perfect. This is very helpful when a number of records for a single form require the identical property or
value change. Forms where Mass Update is applicable include the Person Form and Badge Form.
Click the Show me icon to view a step-by-step animated demo.
Mass Update mode of processing is enabled as follows:
1. Open a blank form.
2. Click Search to display a list of existing records. We recommend entering search criteria to
narrow your search results to only records that are to be updated. Records that match your
search criteria display in the list box to the right of the form.
If there are no records, Mass Update is not available.
3. Move the mouse pointer below any of the tabs and right-click to display a shortcut menu to
related forms. To enable the Mass Update mode, select Mass Update from the shortcut menu.
4. Note the change in the appearance of the form. ONLY those fields or dialog boxes that are
available for mass update changes are now enabled and blank. Certain conditions apply.
5. Select the records you want to adjust from the list box on the right. Typical Microsoft Windows
selection/deselection process is used in this application
6. Make the required adjustment to the form.
7. Click Save. The update of records begins immediately. A window displays with a progress bar,
indicating the update progress. Click Abort if you want to stop the update in progress.
You cannot close a form during the Mass Update process.
Right-click shortcut menu navigation is unavailable when you are in Mass Update
mode.
If you have changed any parameter but did not Save, a message reminds you to discard or
save your changes.
Smaller batch updates are recommended to prevent performance issues during a mass
update.
A Mass Update Complete dialog box displays, indicating completion or failure.
When mass updates are processed to an access right, a log file is generated and a
View Results key displays in the dialog box. Click to view the completion log. We
recommend that you rename and save this file to another location for reference purposes.
Renaming the log prevents an overwrite. The questionable log will be available for
Customer Support to review and locate discrepancies. Be aware that this log file is
automatically overwritten every 7 days, in order to prevent unnecessary data that would
accumulate on your hard drive.
8. When the process is complete, a Mass Update Complete dialog message displays.
9. Right-click and select Mass Update from the shortcut menu to disable and exit Mass Update
mode. The records refresh at this point.
10. Updates display in the list box to the right.
Secure Perfect 6.1.1 User Manual 195

Menu Buttons
View Menu
The Menu Buttons option determines whether or not the Secure Perfect graphics display beside options
in the drop-down menus.
Clear the check box to hide the graphics from view.
Message Format Tab
Alarm Notifier Form
This tab allows you to format the appearance of the e-mail alarm notification, based on your Windows
regional font settings.
Date/Time Format
Select a date/time format from the drop-down list.
Header
Select this check box to display a header greeting. In the Header field, enter text up to 256 alphanumeric
characters. This could be additional details explaining the alarm condition.
• If you do not select the check box, any header message you create will NOT be included in
your e-mail.
• If you do not enter a header greeting, an equivalent white space will display at the beginning
of the e-mail notification.
Footer
Select this check box to display a footer closing. In the Footer field, enter text up to 256 alphanumeric
characters. This space could provide a name and number to contact if the receiver has a question.
• If you do not select the check box, any footer message you create will NOT be included in
your e-mail.
• If you do not enter a foot or closing, an equivalent white space will display at the end of the e-
mail notification.
Alarm Information: The information displayed on the e-mail message may look similar to:
0151-1-01 DI|Alarm|10/16/02 15:20:59
where:
0151-1-01 DI = The micro, board and reader.
Alarm = The alarm state.
10/16/01 15:20:59 = The micro date and time.
Add Alarm Instruction
Select this check box to include the alarm instruction associated with this alarm, in this e-mail notification.
• If this check box is not selected, any associated alarm instruction will not be included in the
message.
• If this check box is selected and there are no alarm instructions, no instructions will be
included in the message.
Alarm/Reset Text
This text is how you want the alarm State to display to the receiver. You can do one of the following:
• Accept the default alarm state entry, as displayed in the language of the current operator.
• Select and replace the existing text with alarm state text in another language, such as the
language of the receiver. You can also add to the text with additional text (no more than 32
alphanumeric characters total) describing the state.
Alarm Text: Default alarm state text is Alarm, displayed in the language of the current operator.
Reset Text: Default alarm reset state text is Reset, displayed in the language of the current operator.
Secure Perfect 6.1.1 User Manual 196

Micro
Device Menu
The Micro option opens the Micro Form that allows you to identify and configure micros.
Micro/5-PX or Micro/PX-2000 Records Generation
When you select a micro type on the Micro Definition tab of the Micro Form, a Power/Comm board is
automatically added to the Configuration column on the Micro Configuration tab of the Micro Form. As a
result, certain additional records are created:
Alarm Records:
• Tamper
• Power
• Lost Badge Alarm
• Invalid Badge
• Host Comm Alarm
• 8RP Reminder: The Micro/PX-2000 supports 4 readers.
• 16DO Reminder: The Micro/PX-2000 supports 8 DO points.
• 20DI Reminder: The Micro/PX-2000 supports 11 DI points.
Micro/PX-2000 boards shipped after November 1, 2003, support the 11th DI as a low-battery
alarm for the micro.
None of these alarms are monitored. If you want them to display on the Alarm Monitor when the alarm is
triggered, you will need to go to the Alarm Form, Alarm Tab and enable Monitor in the Settings section.
In addition, all alarms are automatically assigned to Alarm Group 0. You can change the Alarm Group on
the Alarm Group Form.
Digital Input Records:
• Tamper
• Power
Sixteen (16) Alarm Group Records:
As mentioned above, all alarms are automatically assigned to Alarm Group 0. You can change this on the
Alarm Group Form.
Micro Assignment Dialog Box
This window displays when you click Edit, allowing you to select and assign micro association for this
form. Only micros in the operators’ facilities are available for assignment by this operator.
• Select, and then click the right arrow to assign an available micro.
• Select, and then click the left arrow to unassign a micro.
Secure Perfect 6.1.1 User Manual 197

Micro Configuration Tab
Reference Topics:
Micro/5-PX or Micro/PX-2000 Records Generation
Reader Board Records Generation
DO Board Records Generation
DI Board Records Generation
Micro Form
Use this tab to assign the appropriate boards to this micro.
Before continuing, verify that the micro type (Micro/5-PX, Micro/5-PXN, Micro/PX-2000, or Micro/PXN-
2000) is correct. The boards listed in the Boards column depend on the type of micro you have selected.
Boards
Lists all boards supported by Secure Perfect and the micro type you have selected. To add a board to the
current micro record, click and drag to the Configuration column. If the addition of the board violates a
micro configuration rule, you will get an error and the board will not be added.
Configuration
Lists the current configuration of the micro. A Power/Comm board is automatically added when you
create the micro record. The reader, digital input, and digital output boards will need to be added to
match the physical setup of the micro.
Following the addition or deletion of a board, you MUST click Save for the appropriate records to be
generated or deleted.
Once you add a board, you are restricted to that type of board only. For example, if you add one 2RP
board, any additional boards MUST be 2RP boards. Likewise, you cannot violate any micro configuration
rule. These are based on the capacities for each micro. For example, for the Micro/5-PX, you can only
add up to four 2RP boards, four 2SRP boards, two 4CRP boards, two 8RP boards, or two CK8RP
boards.
Secure Perfect 6.1.1 User Manual 198