Extension installed, but missing from Security Desk and Config Tool - Bosch intrusion panel 4.4

Bosch Intrusion Panel Extension Guide 4.4

Applies to
Bosch intrusion panel 4.4
Last updated
2023-08-04
Content type
Guides > Plugin and extension guides
Language
English
Product
Bosch intrusion panel
Version
4.4

If the extension-specific role Properties page, reports, events and alerts are missing, then the plugin is not installed on your local machine. The plugin must be installed on a Genetecâ„¢ Server (main or expansion) and on all client workstations that are used to monitor incidents.

To help you troubleshoot this issue, refer to the possible causes and their respective solutions below.

Possible symptoms:

  • Enrollment of intrusion detection units always fails.
  • In Config Tool, you cannot see the extension in the the Extensions tab of the intrusion manager role.
  • In Security Desk, you do not see the reports for intrusion unit events or intrusion detection area activities.

Cause

The extension is not installed on the local computer, the license (certificate) is invalid, or you are missing required user privileges.

Solutions

Solution 1: Install the extension on your local computer.

Solution 2: Make sure that a Genetecâ„¢ Server has the extension installed, the role created, and is configured correctly.

Solution 3: Make sure that the Bosch intrusion panels are online and configured properly.

Solution 4: Confirm that the extension is installed on your Security Center computer: from the home page in Security Desk or Config Tool, click About > Installed components and look in the list for entries that begin with Genetec.IntrusionExtensions.

Solution 5: Confirm that your system has a license certificate for the extension: from the home page in Security Desk or Config Tool, click About > Certificates, look in the list for the name of the extension, and make sure that your access permissions are set to Unlimited.

Solution 6: From the home page in Security Desk or Config Tool, click About > Security Center and validate that Intrusion detection is supported, and that the Number of intrusion detection units is greater than zero.