Configuring user settings - Security Center 5.9

Security Center Administrator Guide 5.9

Applies to
Security Center 5.9
Last updated
2022-10-25
Content type
Guides > Administrator guides
Language
English (United States)
Product
Security Center
Version
5.9

After a user is created in Security Center, you can configure their properties, and limit what they are allowed to do on the system.

Before you begin

Create the user.

What you should know

Instead of configuring the properties of an individual user, you can add the user as a member of a user group so that they inherit all the properties of the group.

Procedure

  1. From the Config Tool home page, open the User management task.
  2. Select the user to configure.
  3. Click the Properties tab, and configure the user settings as needed.
    • To temporarily prevent the user from logging on to Security Center, see Deactivating user profiles.
    • To be able to send emails or messages to this user, type an email address in the Email address field, and click Apply.

      You can send emails to users using the Send an email and Email a report actions.

    • To change the user's password or password settings, see Changing password settings for users.
    • To set the user's user level, in the User level option, specify if the user inherits their user level from its parent user group, or set a specific level.
    • (Optional) To configure a different user level for controlling PTZ motors, see Defining user levels for controlling PTZ motors.
  4. Click Apply.
  5. Grant access rights for partitions to the user.
  6. Assign privileges to the user.
  7. Customize how the user can log on.
  8. Click the Advanced tab, and configure the user settings as needed.
    • To cycle the user's open tasks when they log on to Security Center, switch the Start task cycling on logon option to ON.
      Tip: To prevent the user from stopping the task cycling when Security Desk is open, deny them the Start/stop task cycling privilege.
    • To only allow playback of recently archived video for the user, set Limit archive viewing to ON and set the length of the time window. You must switch Inherit from parent to Override to change this setting.
    • (Only non-administrative users) To display GUIDs instead of entity names for the user in Security Desk and Config Tool and prevent the user from updating entity name fields, set Scramble entity names to ON. You must switch Inherit from parent to Override to change this setting.
    • When the user exports video (G64x) or snapshots, the system can include metadata to exported videos or snapshots, such as camera name, creation date, and camera coordinates, which can be useful for investigation. To enable metadata with exported files for the user, switch the Include additional properties on export/snapshot option to ON.
    • To discourage the unauthorized release of video footage by including identifying text in the video stream, see Configuring video watermarking.
  9. Click Apply.