Extension installed, but missing from Security Desk and Config Tool - DMP intrusion panel 4.2.1

DMP Intrusion Panel Extension Guide 4.2.1

Applies to
DMP intrusion panel 4.2.1
Last updated
2023-09-11
Content type
Guides > Plugin and extension guides
Language
English
Product
DMP intrusion panel
Version
4.2

If the extension-specific role Properties page, reports, events and alerts are missing, then the extension is not installed on your local machine. The extension must be installed on a Genetec™ Server (main or expansion) and on all client workstations that are used to monitor incidents.

To help you troubleshoot this issue, refer to the possible causes and their respective solutions below.

Possible symptoms:

  • Enrollment of intrusion detection units always fails.
  • In Config Tool, you cannot see the DMP intrusion panel in the Extensions tab of the Intrusion Manager role.
  • In Security Desk, you do not see the reports for intrusion unit events or intrusion detection area activities.

Cause

The extension is not installed on the local computer, the license (certificate) is invalid, or you are missing required user privileges.

Solutions

Solution 1: Install the extension on your local computer.

Solution 2: Make sure that a Genetec™ Server has the extension installed, the role created, and is configured correctly.

Solution 3: Make sure that the intrusion panels are online and configured properly.

Solution 4: Confirm that the extension is installed on your Security Center computer: from the home page in Security Desk or Config Tool, click About > Installed components and look in the list for entries that begin with Genetec.IntrusionExtensions.

Solution 5: Confirm that your system has a license certificate for the extension: from the home page in Security Desk or Config Tool, click About > Certificates, look in the list for the name of the extension, and make sure that your access permissions are set to Unlimited.

Solution 6: From the home page in Security Desk or Config Tool, click About > Security Center and validate that Intrusion detection is supported, and that the Number of intrusion detection units is greater than zero.