Generating KiwiVision intrusion detector reports in Security Desk - KiwiVision™ 3.1

KiwiVision Video Analytics Plugin Guide 3.1

Applies to
KiwiVision™ 3.1
Last updated
Content type
Guides > Plugin and extension guides
English (United States)

To review and investigate events from KiwiVision™, and events that were triggered in Security Center based on state changes of KiwiVision™ tags, you can use the KiwiVision intrusion detector report in Security Desk.


  1. From the home page in Security Desk, click Tasks and open the KiwiVision intrusion detector report ().
  2. Set up the query filters for your report. Choose one or more of the following filters:
    Select which entities to investigate. For example, a camera that has been configured for KiwiVision™.
    Time range
    Define the time range for the query. The range can be defined for a specific period or for global units of time such as the last day or the last week.
  3. Click Generate report.
    The events are listed in the KiwiVision intrusion detector report pane.

    The following example shows the KiwiVision intrusion detector report displayed in Tiles mode.

    The following report pane columns are available for this report:

    The camera that triggered an intrusion event.
    Frame time
    Date and time that the event occurred.
    A snapshot of the intrusion that triggered the event.
    NOTE: You can browse the event list to identify a snapshot that requires further investigation. Clicking an intrusion event in the event list launches the intrusion video in a tile.

    The following example shows the KiwiVision intrusion detector report as a Stacked rows report displayed in Charts mode.


Watch this video to learn more. Click the Captions icon (CC) to turn on video captions in one of the available languages. If using Internet Explorer, the video might not display. To fix this, open the Compatibility View Settings and clear Display intranet sites in Compatibility View.

After you finish

Using the KiwiVision™ you can also view, in real-time, data changes in Config Tool and incoming events using the Monitoring task in Security Desk.