You can investigate the events and alarms forwarded by the intrusion panels using several of the reports available in Security Desk.
For more information about the purpose, content, and use of these investigation reports, refer to the Security Center User Guide or press F1 in Security Desk to access the online help.
An area must be added to the Event monitoring list in Security Desk in order for the Initiator column in the Monitoring task to show information when the area is armed and disarmed.
If a cardholder is deleted from Security Center after synchronization with the panel, and then the cardholder tries to arm or disarm the panel from the touchscreen, the Initiator field in the Monitoring task is left blank and no warning is triggered.
For a zone set to the Arming type, the panel does not send events when the state changes. This prevents automatic updates in the Maps or Monitoring tasks.
Security Desk investigation report | Where to find more information |
---|---|
Alarm report | Investigate the alarms triggered and the major events that happened in your system (by only selecting critical alarms), who acknowledged a specific alarm, and why. This report is only relevant if you have alarms configured as event-to-actions. |
Intrusion detection area activities | Investigate events that occurred in intrusion detection areas. |
Intrusion detection unit events | Investigate internal events, such as AC fail, battery fail, unit lost, input trouble, and so on related to selected intrusion detection units. |