To help your security personnel quickly respond to a threatening situation, you can
define threat levels.
What you should know
CAUTION:
The system does not clear a threat level automatically. Explicitly define
the actions that are triggered when the threat is cleared.
Procedure
-
Open the System task, click the General
settings view and click the Threat levels tab.
-
At the bottom of the threat level list, click Add an item
().
-
In the Threat level configuration dialog box, enter the
Name, Description, Logical
ID (optional), and Color of the threat level.
Tip: Choose a distinctive color for each threat level. Users can easily
identify the threat when the threat level is set at the system level and the Security
Center background matches that color.
-
Configure the threat level Activation actions.
The system triggers these actions when the threat level is set, independently of the
privileges and permissions of the user who set the threat level.
-
Configure the threat level Deactivation actions.
The system triggers these actions when the threat level is cleared or overwritten by
another one, independently of the privileges and permissions of the user who cleared the
threat level.
-
Click OK.
A new threat level (
) appears in
the threat level list.
-
Click Apply.
After you finish
Make sure that all users who need to set threat levels are part of the
public
partition, and
make sure that they are
assigned the Set threat level user privilege.
- To view which threat levels and security clearance are set on each area, use the
System status task.
- To find out when threat levels were set and cleared, and who did it, use the
Activity trails task.