To help your security personnel quickly respond to a threatening situation, you can define threat levels.
What you should know
- Open the System task, click the General settings view, and click the Threat levels page.
- At the bottom of the threat level list, click Add an item ().
In the Threat level configuration dialog box, enter the
Name, Description, Logical
ID (optional), and Colorof the threat level.
Tip: Choose a distinctive color for each threat level, so that when the threat level is set at the system level and the Security Desk background turns that color, the users can easily identify the threat.
Configure the threat level Activation actions.
These actions are executed by the system when the threat level is set, independently of the privileges and permissions of the user who set the threat level.
Configure the threat level Deactivation actions.
These actions are executed by the system when the threat level is cleared or overwritten by another one, independently of the privileges and permissions of the user who cleared the threat level.
A new threat level () appears in the threat level list.
- Click Apply.
After you finish
- To view which threat levels and security clearance are set on each area, use the System status task.
- To find out when threat levels were set and cleared, and who did it, use the Activity trails task.