Workflow design for Access denied incident management - Genetec Mission Control™ 2.12

Genetec Mission Control™ Supplemental Guide for Incident Workflow Configurations 2.12.1.0

Applies to
Genetec Mission Control™ 2.12
Last updated
2019-11-28
Content type
Guides
Guides > User guides
Language
English (United States)
Product line
Mission Control > Genetec Mission Control™
Version
2.12

You can design incident workflows to detect, manage and resolve Access denied events.

Workflow design for Access denied incidents

The simplest way to plan your workflow is to select frequently encountered causes of Access denied events and configure the system to perform a series of actions based on the cause.

This example focuses on three frequently encountered Access denied events and includes a path for the system to take if the cause of the event is not one of these three.

The Parallel tasks activity here serves as a logical IF. The activity branch that the system takes depends on the operator's response to the dynamic incident procedure. Each activity branch can be configured to perform a sequence of activities to resolve the incident as needed.

In this example, the Access denied: Access rule and Access denied: Expired credential activity branches have incident resolution steps in this workflow itself. The Anti-passback violation and Access denied: Other activity branches trigger another incident with its own set of recipients and incident procedures to resolve the incident. This is an example of one incident as a trigger for another incident.

You can also use the Change incident type activity instead of the Trigger incident activity.

The Change incident type activity preserves the incident history which includes incident ID, aggregated entities and events, unlike the Trigger incident activity, which triggers a new incident with no history and new incident ID.

You can tweak this workflow and use it to manage multiple incidents as well. Each activity branch in the Parallel tasks activity can represent actions relating to a different incident.

The operator's screen for an Access denied incident

When the Access denied event occurs, the incident is triggered. The recipients of the incident, in this case the operators, can see the cause of the event in the Monitoring window in Security Desk.

The dynamic SOP in this example is configured to prompt the operator for cause of the event.

The system then executes the appropriate activity branch in the workflow based on the operator's selection.