You can integrate DMP intrusion panels into Security Center using the DMP intrusion panel extension by following a sequence of steps.
|Step||Task||Where to find more information|
|Understand prerequisites and key issues before deploying|
|1||Learn what you can do using the extension.|
|2||Before installing the extension, read the release notes to learn about the new features, the known issues, and the limitations.|
|3||Learn about the different components and how they connect together.|
|4||Ensure that the server where the extension will be installed meets the recommended system requirements and is running a compatible version of Security Center.|
|Prepare Security Center|
|5||(Optional) In Security Center, create a georeferenced map.|
|6||Verify that the Security Center license has a valid certificate for the . Go to the Config Tool home page, click , and confirm that DMP intrusion panel is in the list.||
|Deploy the extension|
|7||On a Security Center server, download the extension and install it.||Downloading and installing the DMP intrusion panel extension.|
|8||Grant users the privileges that they need to use the extension.||
|9||If not yet done, create the Intrusion Manager role for managing the DMP intrusion panel extension.||Creating the Intrusion Manager role.|
|10||Schedule regular back ups and grooming of events.||Scheduling database backups and cleanups for the DMP intrusion panel extension.|
|11||(Optional) Change the extension configuration to suit your particular needs.||Configuring communications parameters for all DMP intrusion detection units|
|Add and configure the devices|
|12||Prepare the intrusion devices for enrollment.|
|13||Add intrusion devices as intrusion detection units in Security Center.|
|14||Verify that the DMP inputs and outputs are listed as expected.
(Optional) Change the names and descriptions of inputs and outputs.
|Viewing and configuring DMP inputs and outputs.|
|15||(Optional) Enable PIN padding.||Enabling PIN and user code padding.|
|16||(Optional) Configure inputs to raise a Trouble event.||Configuring a DMP input to raise a Trouble event.|
|17||(Optional) Assign cameras to intrusion detection areas and inputs so that you can view video of related events.||Assigning cameras to intrusion detection areas and inputs.|
|18||Review the arming configuration of your intrusion detection areas.
(Optional) Change the Bad Zones setting.
|Configuring bad zones and reviewing arming parameters for DMP intrusion detection areas.|
|19||Create event-to-action for intrusion detection events.||Mapping intrusion panel events to Security Center actions.|
|Synchronizing and configuring DMP user codes and Security Center cardholders|
|20||Import the DMP users from a panel.||Importing DMP intrusion panel users as cardholders.|
|21||If you have Security Center cardholders you want to add as a user on the panel, export those cardholders to the DMP panel.||Exporting cardholders to a DMP intrusion panel.|
|22||Define the ambush code as the duress cardholder.||Defining the ambush code as the duress cardholder.|
|23||(Optional) Schedule automatic updates of users.||Scheduling and automating cardholder export.|