Packard Bell EN TM80 – page 7
Manual for Packard Bell EN TM80

CCTV Alarm
Administration Menu
The CCTV Alarm options opens the CCTV Alarm Form that allows you to link CCTV alarms to Secure
Perfect alarms so that Secure Perfect alarms trigger CCTV events and display on the Secure Perfect
Alarm Monitor Form.
This form is NOT used in the Kalatel Integrated Digital Video option. It is only applicable in the serial
CCTV interface.
CCTV Alarm Assignment
This dialog box allows you to select and assign CCTV alarms to Secure Perfect alarms. Only CCTV
alarms in the operator’s facilities are available for assignment by this operator.
• Select, and then click the right arrow to assign an available alarm.
• Select, and then click the left arrow to unassign an alarm.
CCTV Tab
Alarm Form
Select this tab to assign CCTV alarms to Secure Perfect alarms. The windowpane displays the CCTV
alarms already assigned to this alarm.
Add/Remove: Click to display the CCTV Alarm Assignment dialog box that allows you to add or remove
items from the list.
CCTV Tab
CCTV Alarm Form
Use this tab to set up a CCTV alarm.
CCTV Interface: Select the Interface from the drop-down list. If there is no interface listed, then it has not
been installed.
CCTV Alarm: Select the alarm number from the drop-down list. When you assign a number, an enable
and disable message is automatically generated.
• Enable Message: An enable message is automatically generated when you select a number
in the CCTV Alarm field. You can edit these messages, but any changes to the CCTV alarm
number will overwrite the changes to this message.
• Disable Message: A disable message is automatically generated when you select a number
in the CCTV Alarm field. You can edit these messages, but any changes to the CCTV alarm
number will overwrite the changes to this message.
Reset CCTV Alarm:
• When the Secure Perfect alarm is cleared from the Alarm Monitor: Select this option if you
want the CCTV alarm to reset when the alarm is cleared from the Secure Perfect Alarm
Monitor.
• When the Secure Perfect alarm Resets: Select this option if you want the CCTV alarm to
reset when the alarm is reset in SP.
Change Password
Operations Menu
The Change Password option opens the Change Password Dialog Box that allows you to change your
password.
Secure Perfect 6.1.1 User Manual 119

Change State
If the micro is currently online, this will change the state to offline. If the micro is offline, this will change
the state to online.
Each time a micro is set to online, the database must be downloaded to the micro. If a new micro
database is required, click Download Database as well as Download Badges for the selected micro.
Download Database:
Download Badges:
Check for Update
Reference Topic:
SP Auto Update Configuration Form
File Menu
This item is enabled when the Enable Auto Update option is selected on the SP Auto Update
Configuration Form of the Administration menu.
Each time you log in, your Secure Perfect system checks for updates. Also, at any time, you may select
this item to begin a search of the configured Web site for updates to the Secure Perfect system. This
process searches for new upgrades, compares the version, and if the patch or update needs to be
applied, a dialog box displays a message.
• Click OK to close the dialog box and begin the update process.
• Click Cancel to close the dialog box and process the upgrade at another time.
• If the Web site cannot be reached, a message informs you that communication failed. Recheck your
update configuration settings and try again.
• If no new updates are available for your system, a message displays informing you that your system is
up to date.
Clear Archive Tab
Reference Topic:
Archiving
Appending Archive Databases
Parameters Form
Earliest Date in Current Archive DB: If you have an archive database, this date displays when you click
Show Date.
Latest Date in Current Archive DB: If you have an archive database, this date displays when you click
Show Date.
Show Date: If you have an archive database, click Show Date.
• The Earliest Date in Current Archive DB and Latest Date in Current Archive DB will display.
• If you do not have an archive database, the two date fields will state No Record.
Secure Perfect 6.1.1 User Manual 120

Archive Clean Period:
• Start Date: Select the Start Date of the data that you want to remove from your database by
selecting the month, then the day to begin your archive.
• End Date: Select the End Date of the data that you want to remove from your database by
selecting the month, then the day to end your archive.
• Delete: Press after selecting Start Date and End Date to remove from your database.
The deletion of an archive database takes place in the background. Progress is indicated on the
status bar. This may take hours to complete and is dependent on the size of the Archive database and
the hardware components of your computer.
Clear Button
This option clears all badge transactions from the Activity Monitor Form.
Clicking this icon from the Activity Monitor Form toolbar will access this option:
Clear Search
Search Menu
The Clear Search option clears all data in the current form. Use this option when the form has data and
you want to begin a new search. The option does not conduct a search nor does it affect any data in the
database. It only clears data from the form in preparation for a search or to cancel a change to a record.
The Clear Search option is available only when a form that contains records is open.
Clicking this icon from the Secure Perfect toolbar can also access this option:
Client
Administration Menu
The Client option opens the Client Form that allows you to merge a client computer to your Secure
Perfect system.
Client Assignment Dialog Box
This dialog box allows you to select and assign Secure Perfect client computers to a Client Group. Only
clients in the operator’s facilities are available for assignment by this operator.
• Select, and then click the right arrow to assign an available client.
• Select, and then click the left arrow to unassign a client.
Click OK to close this dialog box and display the results in the Clients windowpane.
Client Group
Administration Menu Item
The Client Group option opens the Client Group form, allowing you to assign Secure Perfect client
computers into logical groups. A comment box is available for entry to describe the configuration. Later,
client groups can be assigned to specific alarm routing and bumping configurations.
Secure Perfect 6.1.1 User Manual 121

Client Group Tab - Client Group Form
On this tab, you must assign at least one Secure Perfect client computer in order to save this Client
Group record.
Element Description
Clients:
This windowpane displays the names of client computers
that are assigned to this Client Group.
Assign Clients
Click to display a Client Assignment dialog box that allows
you to assign Secure Perfect clients to this Client Group.
Comments
Use this field to describe the reason for creating this group or
special considerations for this configuration. This field
accepts 256 characters.
Client Monitor
Operations Menu
The Client Monitor option opens the Client Monitor Form that allows you to obtain client information
such as client type, Imaging status, and connection status. The shortcut key combination for the Client
Monitor Form is CTRL+C.
Clicking this icon from the Secure Perfect toolbar can also access this option:
Secure Perfect 6.1.1 User Manual 122

Client Monitor Form Shortcut Menu
Reference Topics:
Client Monitor Form Toolbar
Client Form
Element Description
To disconnect the selected client.
Disconnect
To launch and enable a CCTV interface (other than integrated CCTV).
Launch
To display the Client Form, to add a client to the Secure Perfect network.
Client Form
To initiate recovery of a host that failed, was taken over by a backup client,
Recover
and is now able to host its original devices. When the default client is running,
a manual intervention is required to bring all its devices back to itself.
This option is enabled and available ONLY on the shortcut menu of the
default host that is now ready to be recovered.
- A notification message informs you of a successful recovery. Control of
devices is returned to the default host.
- A notification message informs you of an unsuccessful recovery. Verify
communication with the default host and retry the recovery.
To initiate recovery of a Regional Database Server host that failed, was taken
Recover Region
over by a backup Regional Server, and is now able to host its database.
This option is enabled and available ONLY on the shortcut menu of the
default host that is now ready to be recovered.
- A notification message informs you of an unsuccessful recovery.
To display the Manual Control form, for this operator to manually perform
Manual Control Form
operations on the system.
Client Monitor Form Toolbar
Reference Topics:
Client Monitor Form Shortcut Menu
Click To
Disconnect the selected client.
Enable a CCTV interface (other than integrated
CCTV).
Secure Perfect 6.1.1 User Manual 123

Client Redundancy Overview
The Secure Perfect software system is responsible for processing alarm and badge transactions from
devices like micros and DVRs. The software is responsible for writing these transactions to the database.
A device such as a micro or DVR is hosted by a single Secure Perfect client. The client could potentially
be responsible for hundreds of devices and can be a single point of failure. Although devices like the
micro are designed to run without the host software running for days, eventually memory is going to be
filled up at the micro end. The redundancy feature in SP 6.0 is designed to address this condition. Clients
can be configured to be backed up by other clients so that, in case of the default hosting client (called the
primary client) being disabled, one of the backup clients takes over all its devices. This is designed to
work automatically without any operator intervention so the system continues to work efficiently. One of
the backup clients performs the role of the default client until the default client is back up and running.
The devices that can be taken over at present are all DVRs, network micros, dialup micros, and network
+ dial up micros. Direct micros cannot be hosted by any other than the default client computer.
The table below will assist you to find the areas in this Help system, relating to the redundancy feature.
Reference Topics:
Configuring Client Redundancy:
Am I Licensed for Client Redundancy? About Secure Perfect
How do I configure backup clients for redundancy? Backup Clients Tab
What micros are supported?
Backup Clients Tab, Assign Micro Phone #s
What are the limits on micros and DVRs? Backup Clients Tab
What is not permitted? Backup Clients Tab
When a Failover Occurs:
Messages Displayed
Backup Clients Tab, Display Redundancy
Notification
Client Monitoring
Client Monitoring, Active Client
How long should I wait when a failover occurs?
Backup Clients Tab , Database Connection
Heartbeat
What alarms display on the Alarm Monitor?
Alarm Tab
What is the behavior on the Digital Video Viewer
and Network List?
Digital Video Viewer
Recovery:
Recovery Notification Messages
Backup Clients Tab, Display Redundancy
Notification
Client Monitoring Client Monitoring
How do I recover? Client Monitor Form Shortcut Menu
What happens when a default client is back up?
Backup Clients Tab, Display Redundancy
Notification
What is the timing on the recovery? Takeover and Recovery Timing
Secure Perfect 6.1.1 User Manual 124

Client Tab
Client Form
Element Description
• When creating a new client record, click Browse to display a Select Client
PC Name
window, listing all computers found on your network by PC name. (Secure
Perfect uses PC names only.) To add a client, select the computer name from
the list and click OK. You can add as many clients as you want but you are
limited to the number of licensed clients connected to the network at one time.
The number of client licenses presently active and connected to the Secure
Perfect system can be found on the Client Monitor form.
• By default, when an existing client record displays, PC Name is read-only and
not available for edit
• Client computers to which devices are associated, cannot be deleted. The
devices must be removed or assigned to another client before this client can
be deleted.
• Client computers assigned as backup clients cannot be deleted. You must first
un-assign this client from the Backup Clients list on the Backup Clients tab,
and then delete.
OS Type
When adding a Secure Perfect client to your system, accept the default OS Type
as Windows. When conducting a search, select either Windows or CCTV from
the drop-down list.
Region
This field is available only when you first open the Client form, and BEFORE you
initiate a Search. To locate a particular Server or client, you are able to select a
Server name from the Region drop-down list. The field default displays the
Database Server computer name. The clients associated with the selected
Region display in the right windowpane. (If you click Search immediately after
you open the Client form, this field displays the default Server name and is
unavailable for selection.)
• Disabled: Select if you want to disable Imaging in order to enable another
Imaging Status
client computer.
• Enabled: Select to enable Imaging here but you are limited to the number of
licensed Imaging stations enabled at one time. The number of Imaging
licenses presently active can be found on the Client Monitor form.
Thin Client
A Secure Perfect client computer can also be a thin client. A thin client has
Status
Terminal Services and/or Citrix Server software installed. If the Secure Perfect
client has Thin Client Status of Enabled, other computers can connect to the
Terminal or Citrix Server on the Secure Perfect client and run Secure Perfect.
• Disabled: Select if you want to disable the thin client option.
• Enabled: Select to enable the thin client option at this Secure Perfect client.
The number of thin clients you can enable is controlled by the number of thin
client licenses you have. Refer to the Client Monitor form, which displays the
number of thin client licenses presently available and in use.
Auto Logoff
Select the number of minutes the system will wait since the last action was taken
before logging off the current operator. To turn off the auto logoff feature and
remain permanently logged in, enter 0 (zero). The default setting is 20 minutes.
You must restart the Secure Perfect client program for changes to the Auto
Logoff selection to take effect.
Display Alarm
Enable this field if you want an alarm dialog box to display whenever an alarm
Notification
occurs, based on facilities available to the current operator.
Secure Perfect 6.1.1 User Manual 125

Client Region
This checkbox displays only on a Global Editions system.
Failover
This checkbox is applicable to Secure Perfect Global Edition systems. When
displayed, the default state of this checkbox is selected and grayed out. If a
database failure occurs at the default Regional Database Server, this client would
automatically fail over to a configured backup Regional Database Server.
Backups are configured on the Region Form, Backup Regions tab.
Click the checkbox to clear and disable the automatic failover option. You might
choose to clear this checkbox to prevent nonessential client failover.
Enable Auto
Secure Perfect services will automatically shut down when a client closes the
Shutdown
Secure Perfect application and meets all the Auto Shutdown criteria.
Ping Time
• Interval: This is the interval of time a broadcast message will be sent,
(msec)
indicating a client is online. (Default is 40,000. This field will not accept an
entry less than 5,000 msec.)
• Timeout: The amount of time that will elapse between broadcast message and
response before the system considers a client offline. The client status will
display on the Client Monitor form. (Default is 120,000. This field will not
accept an entry less than three times the Interval amount specified.)
ACTIVITY PRINTING
CAUTION: Windows 2003 or Win/XP Professional Operating Systems: If the printer you have
selected is hosted by a computer running a Windows 2003 or Win/XP Professional operating system,
you must add permissions to share this printer to the Secure Perfect network. At the host computer,
navigate to your printer property settings. On the Security tab, add ANONYMOUS LOGON or
NETWORK to the Security permissions.
Printers can be connected to the Server or any client computers. The defaults of the activity printer
selections are cleared on any newly configured system. Any system with a newly converted database
will require reconfiguration of these activity printer selections at each client workstation.
Alarm and
You must enable, select a printer, and route alarms to a printer in order for
Guard Tour DI
alarm activity to print.
Activity Printing
• Enable: Select this check box to print alarm activity. If you select to enable
alarm activity printing, you must select a printer in order to save this record.
• Printer: Displays the currently selected printer to which alarm activity will
print. This may be the same or a different printer than that used for badge
transactions.
• Select Printer: Click this button to select a printer to which alarm activity will
print.
Print Alarms At Host must be selected on the Alarm Form in order for alarm
activity to print.
Badge and Zone
You must enable, select a printer, and route badge activity to a printer in order
Activity Printing
to print badge transactions.
• Enable: Select this check box to print badge activity. If you select to enable
badge and zone activity printing, you must select a printer in order to save
this record.
• Printer: Displays the currently selected printer to which badge transactions
will print. This may be the same or a different printer than that used for alarm
activity.
• Select Printer: Click to select a printer to which badge transactions will print.
1) Printer options must be selected on the Reader Form in order for badge
transactions to print. 2) All zone activity transactions print and do not follow
routing or schedules assigned to a reader.
Secure Perfect 6.1.1 User Manual 126

Comments Tab
Micro Form
This tab and windowpane are provided to enter information about this micro, such as location data.
Communication Settings Tab
Reference Topic:
Dial-Up Troubleshooting
Parameters Form
Use this tab to select the modems that will be used for dial-up micros.
Installed Modems: Displays all modems currently installed on the PC. To designate a modem for use
with a dial-up micro, enable it by clicking in the box to the left of the modem name so that a check
displays. If you have a modem installed for support use, DO NOT SELECT THAT MODEM.
Disconnect After Idle: Select the number of minutes you want the system to wait before disconnecting
from the micro when the connection is idle (there is no history or database information being exchanged).
If you select 0, the connection will remain active indefinitely and the host will never drop communication
with the micros.
Network Port Range:
• If you communicate with your micros over a local intranet, this does not apply. Ignore these
remarks.
• If you must cross a firewall to communicate with your micros, you will need to read the
following:
Low end:/High end: You will be required to open up a range of ports sufficient to support the number of
micros with which you must communicate outside a firewall. The first ten port addresses are reserved for
client-to-client communication. Anything beyond the first ten port addresses can be used for micro
communication.
Example Addresses:
Default Low end: 6700
Default High end: 6709
(These are the 10 internal port addresses reserved for client-to-client communication.)
Change High end: to: 6710 = Assign address to 1 micro outside the firewall.
6711 = Assign addresses to 2 micros outside the firewall.
6712 = Assign addresses to 3 micros outside the firewall.
Communications Settings Tab
Digital Video Recorder Form
Use this tab to assign or edit a TCP/IP address, PTZ control, event tagging, and clock time
synchronization.
TCP/IP Address
Assign or edit the TCP/IP network address for the DVR.
PTZ Control
Select TCP/IP or None. The default is None. TCP/IP is to be selected if cameras with PTZ capability are
configured on this DVR and require control from SP. None is to be selected if all cameras on this DVR
are either fixed or if no control of PTZ cameras is desired.
Secure Perfect 6.1.1 User Manual 127

Event Tagging
Select TCP/IP or None. The default is None. Select TCP/IP if event triggers are required to tag recorded
video upon activity from defined readers and alarms. Select None if no tagging of recorded video is
required for event triggers and only access to live video is desired upon activity from defined readers and
alarms.
Time Sync Interval
The DVR date and time clock can be syncronized by its host computer to ensure that access control,
alarm, and video events across the entire system are time stamped in sync. When DVRs on a centralized
system reside in different time zones, the DVRs should be hosted by computers in their same time zone.
The Secure Perfect hosting computers will synchronize their DVR clocks at the interval selected as well
as immediately manage any system date and time changes including daylight savings time. Select one:
• None (default)
• 1 Hour
• 4 Hours
• 8 Hours
• 12 Hours
• 24 Hours
If DVRs are required to be synchronized with the Secure Perfect system date and time clock, 12 Hours is
a recommended setting for most systems.
Conditions of Mass Update
The time to process a mass update depends on your system performance, number, and type of
updates. Specifically, the badge learn and alarm processing functions may be influenced. We
recommend that you schedule mass update processing during off-peak hours for your company.
• GE Security has set 200 as the default maximum number of records that can process
updates at one time. However, this number is configurable. Call GE Security Customer
Support for assistance if you want to reconfigure the default.
• ONLY those fields or dialog boxes that are available for mass update changes are enabled in
Mass Update mode.
• Navigating from any form to another form in Mass Update mode will take that form out of
Mass Update mode.
Person Form:
• The following fields are available for mass update: Facility, Personnel Type, Department, and
Access Rights.
Badge Form:
• The following fields are available for mass update: Assign To, Status, Dates – Issue, Dates –
Expiration, and Dates – Return.
• When changing an assigned badge to unassigned, the status automatically changes to
Issuable.
• When changing status to Issuable, a message displays a Yes or No option. If Yes, the status
automatically changes to Issuable and selected badges are unassigned.
• When changing an unassigned badge (status is Issuable) to an assigned person, the status
changes to Active.
• Records selected for mass update with a status changing to anything other than Issuable will
cause a check for badge assignment.
• If any badge in the mass update selection is not currently assigned, these badge records
become unavailable and a message displays indicating they are unavailable.
Secure Perfect 6.1.1 User Manual 128

Create Default Template
File Menu
Select this option to create a default Report template. This option is available only when a Report Form is
displaying.
If a specific date is part of this template, whenever this report is run, it will use that date; therefore, it is
important to update the calendar criteria as needed.
Creating a Dial-Up Micro Record
Reference Topic:
Records Generation
Set up your modem(s) through the Server or client computer’s operating system. Refer to the
documentation you received with your modem.
1. Select the Administration menu, then select Parameters.
2. Select the Communication Settings tab, and enable the modem(s) that will be used for micros. You
will need to stop the SP Server computer and then restart it.
3. Once you restart Secure Perfect and log in, select the Device menu, then Micro.
4. On the Micro Definition tab, default values will be filled in for the following fields: Head of line and
Badge Loading.
Enter the address of the micro.
Enter the type of micro.
If this micro is the first micro on a string of micros, select Yes under Head of line. Otherwise,
select No and select the head of line micro. If this is a downstream micro that you are adding,
the micro directly upstream (towards the host) from it will need to be reset in order for it to
recognize the micro you are adding.
Example:
If your line of micros looks like this:
Host – Micro 1 – Micro 2
And you want to add Micro 3 to the end of the line so that it now looked like this:
Host – Micro 1 – Micro 2 – Micro 3
Then you would need to reset Micro 2 in order for Micro 3 to be recognized.
For Connection type, select Dial-up.
Select a Badge Loading method.
5. On the Password tab, if you do not enter passwords, the default passwords (one-1, two-2, three-3,
and four-4) are used. If you want to change the passwords, you may do so at any time.
6. On the Time Zone tab, verify and adjust time zone settings as necessary.
7. On the Comments tab, you may enter any information you want or leave this tab blank.
8. On the Events tab, you may want to schedule when APB and T&A are reset and when the host
dials the micro. If you select an event for the Dial field (host dials the micro), you must stop and
restart the SP Server before the host will recognize the event settings.
9. Select the Status tab to view information about the micro such as the firmware version. You can
request the latest information by clicking Refresh.
10. On the Settings to Reach Host tab:
Enter the telephone number(s) that the micro will dial to reach the host.
Enter the interval at which the micro will automatically dial the host.
Enter the number of times the micro will try the same number.
Enter the number of intervals that the micro will wait before trying a telephone number again.
11. On the Settings to Reach Micro tab:
Enter the telephone number(s) that the host will dial to reach the micro.
Enter the interval at which the host will automatically dial the micro.
Enter the number of times the host will try the same number.
Enter the number of intervals that the host will wait before trying a telephone number again.
Secure Perfect 6.1.1 User Manual 129

12. On the Micro Configuration tab, select the boards that are in the micro you are setting up. Click the
desired board in the Boards and drag to the Configuration column. To delete a board from the
Configuration column, select then right-click and select Delete.
13. Click Save to save the record. If there is any required information missing, a message will display
listing those items that are incorrect or missing. Do not forget to save the record again once you fix
those items.
14. When the micro record is created, the records for the associated readers, alarms, alarm groups,
digital outputs, and digital output groups are also created with default data based on the boards you
added on the Micro Configuration tab.
15. Use the Micro Utilities Form to set the micro online.
Creating a Direct-Connect Micro Record
Reference Topic:
Records Generation
1. On the Micro Definition tab of the Micro Form, default values will be filled in for Head of line and
Badge Loading. Complete the following:
Enter the address of the micro.
Enter the type of micro.
If this micro is the first micro on a string of micros, select Yes under Head of line. Otherwise,
select No and select the head of line micro. If this is a downstream micro that you are adding,
the micro directly upstream (towards the host) from it will need to be reset in order for it to
recognize the micro you are adding.
Example:
If your line of micros looks like this:
Host – Micro 1 – Micro 2
And you want to add Micro 3 to the end of the line so that it now looked like this:
Host – Micro 1 – Micro 2 – Micro 3
Then you would need to reset Micro 2 in order for Micro 3 to be recognized.
For connection type, select Direct.
Set Host keep alive time interval.
Enter the PC name of the host computer or navigate and select.
Select a method.
2. On the Password tab, if you do not enter passwords, the default passwords (one-1, two-2, three-3,
and four-4) are used. If you want to change the passwords, you can do so at any time.
3. On the Time Zone tab, a default time zone is filled in. Verify and adjust time zone settings as
necessary.
4. On the Comments tab, enter any information you want or leave blank.
5. On the Events tab, you may want to schedule when APB and T&A are reset.
6. Select the Status tab to view information about the micro such as the firmware version. You can
request the latest information by clicking Refresh.
7. On the Micro Configuration tab, select the boards that are in the micro you are setting up. Click the
board you want and drag to the Configuration column.
8. To delete, select a board from the Configuration column, right-click and select Delete.
9. Click Save. If there is any required information missing, a window will display listing those items
that are incorrect or missing. Don’t forget to save the record again once you fix those items.
10. When the micro record is created, the records for the associated readers, alarms, alarm groups,
digital outputs, and digital output groups are also created with default data based on the boards you
added on the Micro Configuration tab.
11. Use the Micro Utility Form to set the micro online.
Secure Perfect 6.1.1 User Manual 130

D
Database Tab - Reports
Alarm History, Badge History, Zone History, DI History, Time and Attendance, or Operator History
Reports
Use this tab to select the history database to use for this report. The file name displayed on the tab is the
currently selected archive database.
• Select archive database: Click to select the archive history database.
• Use default: Click to use the current history database.
Database Utilites
The Integrity utility runs automatically, following a database creation or conversion and upgrade from a
previous version of Secure Perfect. No user interaction is required.
The utility can be run manually if you want to check your database integrity. The system compares and
validates the integrity of your database schema. If selected, the system will automatically correct missing
or incorrect schema properties such as columns, keys, constraints, indexes, triggers, and tables. The
executable file is installed with Secure Perfect and resides in the Secure Perfect program folder.
1. Locate and double-click the DatabaseIntegrity.exe file to manually run the utility.
2. Enter the Server Name or click the browse button and navigate to the appropriate Server Name.
3. Enter the SQL system administrator ‘sa’ Database Password or accept the encrypted database
password of the default Server.
4. Click Connect to locate and connect to the Secure Perfect databases. The remaining selections are
now enabled. Accept the default options or review and disable selections.
5. Select one of two options:
Verify that Check Database Integrity is selected.
OPTIONAL: Select the Autocorrect checkbox. This feature runs only once and
corrects obvious schema in the database. Results display in a report.
Autocorrect is not available on a Global Edition system.
Select which databases to check.
Select Start to begin. Wait as the Database Integrity tool compares and validates the
integrity of your database. Messages generate to an IntegrityCheck.html file in
your Secure Perfect application Logs folder.
OR
Select Unlock Database Mutex to unlock the shared resource. Select Unlock to
unlock the database mutex for SPSQL.
6. Click OK when the Application Success window displays.
Secure Perfect 6.1.1 User Manual 131

7. Click View Integrity Report to review the messages generated to an IntegrityCheck.html file in your
Secure Perfect application Logs folder. Review the file to determine if database errors were detected.
OR
Click Close to close the window and exit.
The Replication tab is applicable to systems that have Secure Perfect Global Edition installed. We
recommend that you call GE Security Customer Support for assistance in setting the parameters for the
Global Edition database replication.
Date Range Tab - Reports
Roll Call, Alarm History, Badge History, Zone History, DI History, Time and Attendance History, or
Operator History Reports
Use this tab to select a date and time range on which to base this report.
• Daily time range: Will report on transactions that occurred between the start and stop time
each day in the date range. For example, you select a start time of 8:00 a.m., a stop time of
5:00 p.m., a start day of April 1 and a stop day of April 5. You will receive a report of badge
transactions occurring between 8:00 a.m. through 5:00 p.m. each day of the day range.
• Continuous time span: Continuous will report on transactions that occurred between the start
time on the start day to the stop time on the stop day. For example, you select a start time of
8:00 a.m., a stop time of 5:00 p.m., a start day of April 1 and a stop day of April 5. You will
receive a report of alarm transactions occurring between 8:00 a.m. on April 1 through 5:00
p.m. on April 5.
• Start Date: Select the start date range by clicking the desired day on the calendar. To move
ahead or back by a month, click the arrows on either side of the name of the month. To move
ahead or back by a year, click the arrows on either side of the year.
• Start Time: Accept the default start time as displayed or enter a start time.
• Stop Date: Enter an end date range by clicking the desired day on the calendar. To move
ahead or back by a month, click the arrows on either side of the name of the month. To move
ahead or back by a year, click the arrows on either side of the year.
• Stop Time: Accept the default stop time as displayed or enter a stop time.
Definition Tab - Alarm Routing and Bumping Form
This tab allows you to configure the routing of alarms to selected Client Groups according to a schedule
or at all times. Additionally, you can select Client Groups and set a time to bump the alarm to an
additional location.
• You can configure both Routing and Bumping, only a Routing record, or only a Bumping
record.
• Client Groups can be part of any Region in a Secure Perfect Global Edition system.
Element Description
ROUTING:
Client Groups
This windowpane displays the names of Client Groups
assigned to this Routing record.
Assign Client Groups
Click to display an Alarm Routing Client Group Assignment
dialog box that allows you to assign Secure Perfect Client
Groups to this Routing record.
Select one of the following options:
• Always
Select this option if you always want this Client Group to
receive alarms.
• Time Schedule
Select this option to enable the Time Schedule drop-down list
and then select a Time Schedule from the list.
Secure Perfect 6.1.1 User Manual 132

BUMPING:
Client Groups
This windowpane displays the names of Client Groups
assigned to this Bumping record. Typically, the Client Groups
displayed here are different than those assigned to Routing.
Assign Client Groups
Click to display an Alarm Bumping Client Group Assignment
dialog box that allows you to assign Secure Perfect Client
Groups to the Bumping record.
Time To Bump:
• Minutes
• Select the number of minutes to wait before bumping this
alarm notification to an additional location, if the alarm is not
acknowledged or purged at the Routing work station. The
Alarm Monitor form will indicate that this alarm is bumped.
The minimum setting is one minute. The default and
maximum is 30 minutes.
• Seconds
• Select the number of seconds to wait before bumping this
alarm notification to an additional location. The default is
zero.
• Comments
• Use this field to describe the reason for creating this record
or special considerations for this configuration. This field
accepts 256 characters. It is not necessary to complete an
entry in this field.
Definition Tab - API Connections Form
Enter information that defines an interface license for external application integration to Secure Perfect.
Application Login: Enter the login used by the external application to connect and access the API. Each
login must be unique.
Password: We recommend a noncryptic password. The password must be greater than four
alphanumeric or wildcard characters, with no spaces. The password is NOT case sensitive.
Confirm Password: Enter the password a second time.
PC Name: From the drop-down list, select the Secure Perfect computer that will host the external
application.
Definition Tab - Camera Form
This tab displays the camera channel address, with which DVR this camera is associated, and camera
type configurable for Fixed or PTZ. The camera can be enabled or disabled for viewing and managing
from within SP. Use this form to edit the parameters of the selected camera record.
Address
This is a read-only field. The address of the camera is automatically assigned. The address is a 2-digit
number that corresponds to the camera channel on the back of the DVR.
DVMR
This is a read-only field. This field displays the corresponding DVR with which this camera is associated.
Camera Type
Select a type of camera behavior as Fixed or PTZ from the drop-down list.
Enable Camera
By default, this checkbox is selected. The camera can be enabled or disabled for viewing and managing
from within Secure Perfect and setting accessibility from the Digital Video Viewer. Disabled cameras will
not display on the Digital Video Viewer.
Secure Perfect 6.1.1 User Manual 133

Definition Tab - Camera Preset Form
Preset
In this text field, enter a number within the range of 1 to 32. This number will only reference the preset
number programmed and stored in a camera with PTZ capability. Click Save. This preset is now
available for assignment, to a specific camera.
Definition Tab - Digital Video Recorder Form
Use this tab to assign or edit a bus address, type, host computer, or poll time.
Field Description
DVR
Enter a DVR Address, a unique Secure Perfect logical address
Address
associated with this DVR (from 1 to 255). This field will not be
available to edit existing records. This number is used in Secure
Perfect software to uniquely identify the DVR and its related
records.
DVR Type
Select a DVR type from the drop-down list. Secure Perfect currently
supports: 4, 10, and 16-camera channel multiplexer/recorder
models from Kalatel. This field will not be available for edit on
existing records. When you click Save, the number of camera
records will be created equivalent to the type of DVR you selected.
Bus
The bus address is a 2-digit field in the range of 1 to 32. The bus
Address
address refers to the physical DVR device address on the RS-485
bus and must be entered when multiple DVRs exist on a single bus
and/or for controlling camera(s) with PTZ capability.
Host
Select a Default Hostname from the drop-down list that will host
Computer
the defined DVR and act as its communications server.
If the Default Hostname computer is in a failover condition, you
cannot re-assign this DVR to any other Host computer except the
Active Client that is presently hosting this device.
• Enter Poll Interval as the length of time in seconds that will
Poll Time
elapse prior to a staus request being sent to the DVR for
(seconds)
verification of communications and processing of error and/or
alarm messages since the last poll.
• Enter Timeout as a length of time to wait for a response after a
request prior to retrying (if no response has been returned).
• Enter Retry Interval as the length of time to wait between
retries.
• Enter Retry Count as the number of retries to attempt before
qualifying a communications failure.
Delete Record
File Menu Item
The Delete Record option deletes the current record from the database. BE CAREFUL when selecting
this option, as deleted records cannot be recovered! The Delete Record option is available only when a
form is open, contains records, and you have been given all permissions.
Some forms such as the Reader Form do not have a delete option.
Clicking this icon from the Secure Perfect toolbar can also access this option:
Secure Perfect 6.1.1 User Manual 134

Delete Template
File Menu
Select this option to delete the current Report template. This option is available only when a Report Form
is displaying with a loaded template.
<deleted> Displays After I Delete All the Records
To correct this, click Clear, and then click Add.
Department
Personnel Menu
The Department option opens the Department form that allows you to create departments that can then
be assigned to person records.
Department Tab
Department Form
Click Search to display or modify a list of existing departments. Click Add to create additional department
records of your own, based on your company.
DES/DES III Data Encryption Standards
Data Encryption is additional security assigned to protect the Host-to-micro exchange of information. The
data messages are encrypted.
Methods of Encryption
• DES: This option uses a single pass of authentication and 16 unique hex characters are
required.
• DES III: This method of encryption uses a three-pass authentication process. Starting at the
left, the first pass authenticates 16 hex characters. The second pass authenticates 16 hex
characters. The third pass authenticates all 48 hex characters.
Secure Perfect 6.1.1 User Manual 135

Design Tab
Badge Design Form
Use this tab to create a new badge design record. If you are editing an existing design, these options are
not available.
Select one of the following:
• Select Default Layout: Select a badge default layout as Portrait or Landscape.
• Select Import Layout: Select Import Layout to make available the option to Browse to the Secure
Perfect designs folder and import an existing design. If you have already chosen a default layout,
this option is unavailable.
• Click Save to enable the Edit Badge Design button.
Edit Badge Design: Click to open the badge designer program that allows you to draw the graphics that
comprise the badge design. If you had a previous version of badge designer that created files with a
.gdr extension, you will be prompted to save the file as a .dgn when you edit a badge design for the
first time. Access the extensive Online Help system from the Badge Designer toolbar. Additionally, refer
to the Badge Designer User Manual, and review the "What’s New" section. A PDF file of the manual is
provided on your documentation CD.
• Each workstation where badge design or badge printing is to be performed must have its own
license. Refer to your Secure Perfect Installation Guide for additional details.
• If Imaging Status is not enabled for this client workstation, this feature is unavailable.
Device Configuration
Reports Menu
The Device Configuration option opens the Device Report Form that allows you to create a report on
devices such as micros, readers, alarms, alarm groups, digital outputs, digital output groups, digital
inputs, DVRs, cameras, and elevators.
Device Menu Selections
The following selections display in the Device drop-down menu:
Micro
Reader
Alarm
Alarm Group
Digital Output
Digital Output Group
Digital Input
Elevator
Digital Video Recorder
Camera
Secure Perfect 6.1.1 User Manual 136

Diagnostic Setting
Administration Menu
The Diagnostic Setting option opens the Diagnostic Setting Form that allows you to select items for
which diagnostic information will be recorded in the diagnostics log, as created on the LogFile Form. This
is a good place to start troubleshooting.
Diagnostic Viewer
Administration Menu
The Diagnostic Viewer option opens the DiagView program. The items you selected on the Diagnostic
Setting Form determine the debug messages displayed by the DiagView program.
The DiagView program has its own Help system for additional details.
Diagnostic Viewer
When you select Diagnostic Viewer on the Administration menu, the DiagView program opens. The
activities of your selected component are displayed. (Those items with the COM # and Line # as part of
the component name have the highest effect on system performance and hard drive usage.)
The DiagView Help system provides additional details of the program.
Dial-Up/Hangup
If the dial-up micro is currently connected, this option will disconnect from the micro.
Clicking this icon from the Micro Utility Form toolbar will access this option:
Secure Perfect 6.1.1 User Manual 137

Dial-Up Troubleshooting
Reference Topic:
Micro Utility Form
Your DiagView program logfile will indicate modem status by displaying one of two possible messages:
Message 1: The following modem is not functioning properly: <modem name>.
Message 2: The following modem is functioning properly: <modem name>.
Where <modem name> is the name of the modem, such as Hayes Accura 33.6.
Message 1 will display on the logfile every 90 seconds following a period when the modem is NOT
operating, until the modem is available and operational again. Verify the following:
• Selected modem on Parameters Form is identical to the modem you want to use. (If the
modem you want to use is not on the list of available modems, you may have to reinstall the
driver for the modem or select another modem.)
• Modem is turned on.
• Comm port connection is complete.
• Connection is plugged in properly.
• Modem settings are correct. (Maximum speed value of 9600 applies to MOST modems. If
you are having problems using this setting, refer to your modem manual for more
information.)
Message 2 will display ONE time only, and that is when your modem returns to operational after a period
when the modem was NOT operational.
The Micro Utility Form will indicate that the micro dedicated to a modem is in an error state.
Secure Perfect 6.1.1 User Manual 138