Access denied incident management - Genetec Mission Control™ 2.12

Genetec Mission Control™ Supplemental Guide for Incident Workflow Configurations 2.12.1.0

Applies to
Genetec Mission Control™ 2.12
Last updated
2019-11-28
Content type
Guides
Guides > User guides
Language
English (United States)
Product line
Mission Control > Genetec Mission Control™
Version
2.12

Access denied events can have many triggers, from lost or stolen credentials to unassigned access rules. For incidents that are triggered by any Access denied event, you can configure your workflows execute a different sequence of steps based on the cause.

Considerations for Access denied incident configuration

When configuring an incident to partially automate incident resolution for Access denied events, there are four things to consider:
  1. Alarms or events that can be used to trigger a Access denied incident.
  2. Users or user groups who need to be alerted when the incident is triggered.
  3. Dynamic incident procedures to guide the operators towards incident resolution.
  4. Incident workflow that responds intuitively based on real-time operator responses.

Incident trigger configuration for Access denied incidents

You can configure the system to trigger the incident irrespective of the source of the Access denied event as follows:
  1. From the Config Tool home page, open the Incident configuration task, and select the incident you want to configure.
  2. Click the Triggers page.
  3. Click Add event.
  4. Select Access denied and leave Source unspecified.

Recipient configuration for Access denied incidents

This configuration depends on your procedure to handle such events. The recipients and the subsequent series of steps are determined by the steps you want the system to perform to resolve this incident.

In this example, only the operators need to get the alert, because each cause of the Access denied event triggers another incident with its own set of recipients and procedures. In the Advanced recipient configuration, you can select Supervisors and Administrators to be recipients when the intended recipients are logged off.