The notification tray contains icons that allow quick access to certain system features, and also displays indicators for system events and status information. The notification tray display settings are saved as part of your user profile and apply to both Security Desk and Config Tool.
The following table lists the notification tray icons, and what you can use them
for:
Icon | Name | Description |
---|---|---|
Clock | Shows the local time. Hover your mouse pointer over the clock to see the current date in a tooltip. You can customize the time zone settings. | |
Resources meter | Shows the usage of your computer resources (CPU, memory, GPU, and network). Hover your mouse pointer over the icon to view the usage of resources in percentages. Click to open the Hardware information dialog box to view additional information and troubleshooting hints. | |
Session info | Shows the current username and Security Center Directory name. Double-click to toggle between the long and short display. | |
Volume | Shows the volume setting (0 - 100) of Security Desk. Click to adjust the volume using a slider, or to mute the volume. | |
Monitor ID | Shows the logical ID number assigned to your Security Desk monitor. Every individual monitor is assigned a unique ID number for the purpose of CCTV keyboard control, macros, and remote monitoring. | |
Remote monitoring | Shows how many users are remotely controlling your Security Desk workstation. Click to view information about the users controlling your Security Desk, or kick out the users if you have the privileges to do so. | |
Record types | Shows the number of record types for which the record provider is offline (). In Security Center, a record type defines the data format and display properties of a set of records that you can share across the entire system through the Record Fusion Service role. Click to view which record types and providers are offline. For more information, see Using correlation to derive useful intelligence. | |
System messages | Shows the number of current system messages (health issues, warnings, messages, and health events). Click to open the System messages dialog box to read and review the messages. If there are health issues, the icon turns red (). If there are warnings, the icon turns yellow. If there are only messages, the icon turns blue. For more information, see Reviewing system messages. | |
Hot actions | Click to open the Hot actions dialog box, and trigger a manual action or a hot action. Hot actions are actions you can trigger by pressing a function key on your keyboard. For more information, see Triggering hot actions in Security Center. | |
Joystick | Shows that a USB controller, such as a joystick, is connected to your Security Desk workstation. | |
CCTV Keyboard | Shows that a security keyboard is connected to your Security Desk workstation. | |
Threat levels | Shows if there is a threat level set on your system. The icon turns red () when a threat level is activated. Click to open the Threat levels dialog box and activate or deactivate a threat level. For more information, see Responding to critical events through threat levels. | |
Alarms | Shows the number of active alarms directed to you. The icon turns red () when you have active alarms in the system. Click to open the Alarm monitoring dialog box and view the active alarms. For more information, see Acknowledging alarms. | |
Inventory | Shows the number of MLPI offload files waiting to be reconciled. Click to open the Inventory management task and reconcile the reads. For more information, see Creating parking facility inventories. | |
Updates | Appears when there are critical firmware updates required. Click the icon to view the details. | |
Intrusion detection | Shows the number of intrusion detection entities that require your attention (). Click to view the details in the Intrusion detection overview dialog box. | |
Task cycling | Click to turn task cycling on or off. For more information about how to adjust the time spent on each task, see Customizing task behavior in Security Desk. | |
Background process | Indicates that a process is running in the background, such as a video file export. Click the icon to view more details about the specific process that is running. | |
Card requests | Shows the number of pending requests for credential cards to be printed (). Click to open the Card requests dialog box and respond to the request. For more information, see Responding to credential card requests. | |
Video file conversion | Shows the number of video file conversion requests that are pending and in progress (), or complete ). Click to open the Conversion dialog box. For more information, see Converting video files to ASF or MP4 format. | |
Retrieve cloud archives | Shows the number of video requests from long-term Cloud storage that are in progress (), or complete ). Click to open the Retrieve cloud archives dialog box. For more information, see Requesting video archives from long-term Cloud storage. | |
Genetec Clearance™ notifications | Shows the number of queued video export or upload requests to Genetec Clearance™ (). Genetec Clearance™ is an evidence management system that you can use to help accelerate investigations by securely collecting, managing, and sharing evidence from different sources. You only see these requests if the Genetec Clearance™ role is created in your system. For more information, see the Genetec Clearance™ Plugin Guide. |