An authorized user is a user who can see (has the right to
access) the entities contained in a partition. Users can only exercise their privileges
on entities they can see.
Access control health history
The Access control health
history task is a maintenance task that reports on events related to the
health of access control entities. Unlike the events in the Health
history report, the events in the Access control health
history report are not generated by the Health Monitor role, identified
by an event number, or categorized by severity.
access control unit
An access control unit entity represents an intelligent
access control device, such as a Synergis™
appliance or an HID network controller, that communicates directly with the Access
Manager over an IP network. An access control unit operates autonomously when it is
disconnected from the Access Manager.
Also known as: door
Access control unit events
The Access control unit events
task is a maintenance task that reports on events pertaining to selected access control
The Access Manager role manages and monitors access
control units on the system.
An access point is any entry (or exit) point to a physical
area where access can be monitored and governed by access rules. An access point is
typically a door side.
An access right is the basic right users must have over any
part of the system before they can do anything with it. Other rights, such as viewing
and modifying entity configurations, are granted through privileges. In the context of a Synergis™ system, an access right is
the right granted to a cardholder to pass through an access point at a given date and
An access rule entity defines a list of cardholders to whom
access is either granted or denied based on a schedule. Access rules can be applied to
secured areas and doors for entries and exits, or to intrusion detection areas for
arming and disarming.
Access rule configuration
The Access rule configuration
task is a maintenance task that reports on entities and access points affected by a
given access rule.
Access troubleshooter is a tool that helps you
detect and diagnose access configuration problems.
With this tool, you can find out
about the following:
- Who is allowed to pass through an access point at a given date and time
- Which access points a cardholder is allowed to use at a given date and time
- Why a given cardholder can or cannot use an access point at a given date and
An action is a user-programmable function that can be triggered as an
automatic response to an event, such as door held open for too long or object left
unattended, or that can be executed according to a specific time table.
An active alarm is an alarm that has not yet been
Active Directory is a directory service created by
Microsoft, and a type of role that imports users and cardholders from an Active
Directory and keeps them synchronized.
Active Directory (AD)
The Activity trails task is a
maintenance task that reports on the user activity related to video, access control, and ALPR
functionality. This task can provide information such as who played back which video
recordings, who used the Hotlist and permit editor, who enabled hotlist filtering, and much
Advanced Systems Format
The Advanced Systems Format (ASF) is a video streaming format from
Microsoft. The ASF format can only be played in media players that support this format,
such as Windows Media Player.
Advanced Systems Format (ASF)
An agent is a subprocess created by a Security Center role to run
simultaneously on multiple servers for the purpose of sharing its load.
An alarm entity describes a particular type of trouble situation
that requires immediate attention and how it can be handled in Security Center. For example, an alarm can indicate
which entities (usually cameras and doors) best describe the situation, who must be
notified, how it must be displayed to the user, and so on.
An alarm acknowledgement is the final user response
to an alarm that ends its lifecycle and removes it from the active alarm list. In
Security Center, we have two variants of
alarm acknowledgements: default and alternative. Each variant is associated to a
different event so that specific actions can be programmed based on the alarm
response selected by the user.
The Alarm monitoring task is an
operation task that you can use to monitor and respond to alarms (acknowledge, forward,
snooze, and so on) in real time, and to review past alarms.
The Alarm report task is an
investigation task that you can use to search and view current and past
An analog monitor entity represents a monitor that
displays video from an analog source, such as a video decoder or an analog camera. This term
is used in Security Center to refer to monitors that
are not controlled by a computer.
Antipassback is an access restriction placed on a secured
area that prevents a cardholder from entering an area that they have not yet exited
from, and vice versa.
The Archiver role is responsible for the discovery, status
polling, and control of video units. The Archiver also manages the video archive and
performs motion detection if it is not done on the unit itself.
The Archiver events task is a
maintenance task that reports on events pertaining to selected Archiver
The Archives task is an investigation task
that you can use to find and view video archives by camera and time
The Archive storage details
task is a maintenance task that reports on the video files (file name, start and end time,
file size, protection status, and so on) used to store video archive. Using this task, you can
also change the protection status of these video files.
Archive transfer is the process of transferring your video
data from one location to another. The video is recorded and stored on the video unit
itself or on an Archiver storage disk, and then the recordings are transferred to
In Security Center, an area
entity represents a concept or a physical location (room, floor, building, site, and so
on) used for grouping other entities in the system.
The Area activities task is an
investigation task that reports on access control events pertaining to selected
The Area presence is and investigation
task that provides a snapshot of all cardholders and visitors currently present in a
The area view is a view that organizes the commonly used entities
such as doors, cameras, tile plugins, intrusion detection areas, zones, and so on, by
areas. This view is primarily created for the day to day work of the security
An asset entity represents any valuable object with an RFID tag
attached, thus allowing it to be tracked by an asset management
Asynchronous video is simultaneous playback video from
more than one camera that are not synchronized in time.
An audio decoder is a device or software that decodes compressed
audio streams for playback. Synonym of speaker.
An audio encoder is a device or software that encodes audio
streams using a compression algorithm. Synonym of microphone.
The Audit trails task is a maintenance
task that reports on the configuration changes of the selected entities in the system.
The report also indicates the user who made the changes.
Automatic enrollment is when new IP units on a network are
automatically discovered by and added to Security Center. The role that is responsible
for the units broadcasts a discovery request on a specific port, and the units
listening on that port respond with a message that contains the connection information
about themselves. The role then uses the information to configure the connection to the
unit and enable communication.
automatic license plate recognition
Automatic license plate recognition (ALPR) is an image processing
technology used to read license plate numbers. ALPR converts license plate numbers
cropped from camera images into a database searchable format.
automatic license plate recognition (ALPR)
The AutoVu™ automatic
license plate recognition (ALPR) system automates license plate reading and
identification, making it easier for law enforcement and for municipal and commercial
organizations to locate vehicles of interest and enforce parking restrictions. Designed
for both fixed and mobile installations, the AutoVu™ system is ideal for a variety of applications
and entities, including law enforcement, municipal, and commercial
The Auxiliary Archiver role supplements the video
archive produced by the Archiver role. Unlike the Archiver role, the Auxiliary Archiver role
is not bound to any particular discovery port, therefore, it can archive any camera in
the system, including cameras federated from other Security Center systems. The Auxiliary Archiver role cannot
operate independently; it requires the Archiver role to communicate with video
The Badge designer is the tool that you can use to design
and modify badge templates.
A badge template is an entity used to configure a printing
template for badges.
A bookmark is an indicator of an event or incident that is used
to mark a specific point in time in a recorded video sequence. A bookmark also contains a
short text description that can be used to search for and review the video sequences at a
The Bookmarks task is an investigation
task that searches for bookmarks related to selected cameras within a specified time
Broadcast is the communication between a single sender and all
receivers on a network.
camera (Security Center)
A camera entity represents a single video source in the system.
The video source can either be an IP camera, or an analog camera that connects to the
video encoder of a video unit. Multiple video streams can be generated from the same
Camera blocking is an Omnicast™ feature that lets you restrict the viewing
of video (live or playback) from certain cameras to users with a minimum user
The Camera configuration task
is a maintenance task that reports on the properties and settings of local cameras in
your system (manufacturer, resolution, frame rate, stream usage, and so
The Camera events task is an
investigation task that reports on events pertaining to selected cameras within a
specified time range.
A camera sequence is an entity that defines a list of
cameras that are displayed one after another in a rotating fashion within a single tile
Canvas is one of the panes found in the Security
Desk's task workspace.
The canvas is used to display multimedia information, such as videos, maps, and
pictures. It is further divided into three panels: the tiles, the dashboard, and the
Card and PIN
Card and PIN is an access point mode that requires a cardholder to
present their card, and then enter a personal identification number (PIN).
A cardholder entity represents a person who can enter and
exit secured areas by virtue of their credentials (typically access cards) and whose
activities can be tracked.
The Cardholder access rights
task is a maintenance task that reports on which cardholders and cardholder groups are
granted or denied access to selected areas, doors, and elevators.
The Cardholder activities task
is an investigation task that reports on cardholder activities, such as access denied,
first person in, last person out, antipassback violation, and so on.
configuration is a maintenance task that reports on cardholder
properties, such as first name, last name, picture, status, custom properties, and so
A cardholder group is an entity that defines the common
access rights of a group of cardholders.
The Cardholder management task
is an operation task. You can use this task to create, modify, and delete cardholders.
With this task, you can also manage a cardholders' credentials, including temporary
A cash register entity represents a single cash register
(or terminal) in a point of sale system.
Designates one of the following: (1) digital
certificate; (2) SDK certificate.
the Security Center administrative application used to
manage all Security Center users and to configure all
Security Center entities such as areas, cameras,
doors, schedules, cardholders, patrol vehicles, ALPR units, and hardware
The Conflict resolution utility is a tool that
helps you resolve conflicts caused by importing users and cardholders from an Active
A controlled exit is when credentials are necessary to leave a
Controller module is the processing component of
Controller with IP capability. This module comes
pre-loaded with the controller firmware and the web-based administration tool, Synergis™ Appliance Portal.
Copy configuration tool
The Copy configuration tool helps you save
configuration time by copying the settings of one entity to many others that partially
share the same settings.
A credential entity represents a proximity card, a biometrics
template, or a PIN required to gain access to a secured area. A credential can only be
assigned to one cardholder at a time.
The Credential activities task
is an investigation task that reports on credential related activities, such as access
denied due to expired, inactive, lost, or stolen credentialsl, and so
A credential code is a textual representation of the
credential, typically indicating the Facility code and the Card number. For credentials
using custom card formats, the user can choose what to include in the credential
The Credential configuration
task is a maintenance task that reports on credential properties, such as status,
assigned cardholder, card format, credential code, custom properties, and so
The Credential management task
is an operation task. You can use this task to create, modify, and delete credentials.
With this task, you can also print badges and enroll large numbers of card credentials
into the system, either by scanning them at a designated card reader or by entering a
range of values.
The Credential request
history task is an investigation task that reports on which users
requested, canceled, or printed cardholder credentials.
A custom event is an event added after the initial system
installation. Events defined at system installation are called system events. Custom
events can be user-defined or automatically added through plugin installations. Unlike
system events, custom events can be renamed and deleted.
A custom field is a user-defined property that is associated
with an entity type and is used to store additional information that is useful to your
A database server is an application that manages
databases and handles data requests made by client applications. Security Center uses Microsoft SQL Server as its
A debounce is the amount of time an input can be in a changed
state (for example, from active to inactive) before the state change is reported.
Electrical switches often cause temporarily unstable signals when changing states,
possibly confusing the logical circuitry. Debouncing is used to filter out unstable
signals by ignoring all state changes that are shorter than a certain period (in
Degraded mode is an offline operation mode of the interface
module when the connection to the Synergis™ unit
is lost. The interface module grants access to all credentials matching a specified
Dependent mode is an online operation mode of the
interface module where the Synergis™ unit makes all access control decisions. Not all
interface modules can operate in dependent mode.
Dewarping is the transformation used to straighten a digital image
taken with a fisheye lens.
A digital signature is cryptographic metadata added to
video frames by the Archiver or Auxiliary Archiver to ensure their authenticity. If a
video sequence is manipulated by adding, deleting, or modifying frames, the signature of
the modified content will differ from the original, indicating that the video
sequence has been tampered with.
The Directory role identifies a Security Center system. It manages all entity
configurations and system-wide settings.
Only a single instance of this role is permitted on
your system. The server hosting the Directory role is called the main server, and
must be set up first. All other servers you add in Security Center are called
expansion servers, and must connect to the main server to be part of the same
The Directory Manager role manages the Directory
failover and load balancing to produce the high availability characteristics in Security Center.
A Directory server is any one of the multiple servers
simultaneously running the Directory role in a high availability
A discovery port is a port used by certain Security Center roles
(Access Manager, Archiver, ALPR Manager) to find the units they are responsible for on
the LAN. No two discovery ports can be the same on one system.
A door entity represents a physical barrier. Often, this is an
actual door but it could also be a gate, a turnstile, or any other controllable barrier.
Each door has two sides, named In and Out by default. Each side is an
access point (entrance or exit) to a secured area.
The Door activities task is an
investigation task that generates reports on door-related activities, such as access
denied, door forced open, door open too long, hardware tamper, and so
A door contact monitors the state of a door, whether it is open or
closed. It can also be used to detect an improper state, such as door open too
Every door has two sides, named In and Out by default.
Each side is an access point to an area. For example, passing through one side leads
into an area, and passing through the other side leads out of that area. For the
purposes of access management, the credentials that are required to pass through a door
in one direction are not necessarily the same that are required to pass through in the
The Door troubleshooter task is
a maintenance task that lists all the cardholders who have access to a particular door
side or elevator floor at a specific date and time.
Driver Development Kit
Driver Development Kit is a SDK for creating device
Driver Development Kit (DDK)
A duress is a special code used to disarm an alarm system. This code
quietly alerts the monitoring station that the alarm system was disarmed under
Edge recording is the process of recording and storing
recorded videos on the peripheral device, thus removing the need for a centralized recording
server or unit. With edge recording, you can store video directly on the camera’s internal
storage device (SD card) or on a network attached storage volume (NAS volume).
electric door strike
An electric door strike is an electric device that releases
the door latch when current is applied.
An elevator is an entity that provides access control
properties to elevators. For an elevator, each floor is considered an access
The Elevator activities task is
an investigation task that reports on elevator related activities, such as access
denied, floor accessed, unit is offline, hardware tamper, and so on.
To enforce is to take action following a confirmed hit. For example, a
parking officer can enforce a scofflaw violation (unpaid parking tickets) by placing a
wheel boot on the vehicle.
Entities are the basic building blocks of Security Center. Everything
that requires configuration is represented by an entity. An entity can represent a
physical device, such as a camera or a door, or an abstract concept, such as an alarm, a
schedule, a user, a role, a plugin, or an add-on.
An entity tree is the graphical representation of Security Center
entities in a tree structure, illustrating the hierarchical nature of their
An event indicates the occurrence of an activity or incident, such
as access denied to a cardholder or motion detected on a camera. Events are
automatically logged in Security Center. Every
event has an entity as its main focus, called the event source.
An event-to-action links an action to an event. For example, you
can configure Security Center to trigger an
alarm when a door is forced open.
An expansion server is any server machine in a Security Center
system that does not host the Directory role. The purpose of the expansion server is to
add to the processing power of the system.
Failover is a backup operational mode in which a role (system
function) is automatically transferred from its primary server to a secondary server
that is on standby. This transfer between servers occurs only if the primary server
becomes unavailable, either through failure or through scheduled downtime.
A federated entity is any entity that is imported from an
independent system through one of the Federation™
A federated system is a independent system (Omnicast™ or
Security Center) that is unified under your
local Security Center through a Federation™ role, so that the local users can view and
control its entities as if they belong to their local system.
The Federation™ feature
joins multiple, independent Genetec™ IP
security systems into a single virtual system. With this feature, users on the central
Security Center system can view and control entities that belong to remote
The Forensic search task is an
investigation task that searches for video sequences based on video analytics
four-port RS-485 module
A four-port RS-485 module is a RS-485
communication component of Synergis™ Master
Controller with four ports
(or channels) named A, B, C, and D. The number of interface modules you can connect to
each channel depends on the type of hardware you have.
A free access is an access point state where no credentials are
necessary to enter a secured area. The door is unlocked. This is typically used during
normal business hours, as a temporary measure during maintenance, or when the access
control system is first powered up and is yet to be configured.
A free exit is an access point state where no credentials are
necessary to leave a secured area. The person releases the door by turning the doorknob,
or by pressing the REX button, and walks out. An automatic door closer shuts the door so
it can be locked after being opened.
G64 is a Security Center format used by archiving roles (Archiver and
Auxiliary Archiver) to store video sequences issued from a single camera. This data
format supports audio, bookmarks, metadata overlays, timestamps, motion and event
markers, and variable frame rate and resolution.
Server is the Windows service that is at the core of Security Center architecture, and that must be installed on
every computer that is part of the Security Center's
pool of servers. Every such server is a generic computing resource capable of taking on any
role (set of functions) you assign to it.
a media player that is used to view exported G64 and G64x video files from Security
Desk, or on a computer that does not
have Security Center installed.
A ghost camera is an entity used as a substitute camera.
This entity is automatically created by the Archiver when video archives are detected for a
camera whose definition has been deleted from the Directory, either accidentally or because
the physical device no longer exists. Ghost cameras cannot be configured, and only exist so
users can reference the video archive that would otherwise not be associated to any
Geographic Information System
Geographic Information System (GIS) is a
system that captures spatial geographical data. Map Manager can connect to third-party
vendors that provide GIS services in order to bring maps and all types of geographically
referenced data to Security Center.
Geographic Information System (GIS)
Global Cardholder Synchronizer
The Global Cardholder Synchronizer role ensures the
two-way synchronization of shared cardholders and their related entities between the
local system (sharing guest) where it resides and the central system (sharing
Global Cardholder Synchronizer (GCS)
A global entity is an entity that is shared across multiple
independent Security Center systems by virtue of its membership to a global partition.
Only cardholders, cardholder groups, credentials, and badge templates are eligible for
Global partition is a partition that is shared across multiple
independent Security Center systems by the partition owner, called the sharing
hardware integration package
A hardware integration package, or HIP, is an
update that can be applied to Security Center.
It enables the management of new functionalities (for example, new video unit types),
without requiring an upgrade to the next Security Center release.
hardware integration package (HIP)
The Hardware inventory task is a
maintenance task that reports on the characteristics (unit model, firmware version, IP
address, time zone, and so on) of access control, video, intrusion detection, and ALPR
units in your system.
A hardware zone is a zone entity in which the I/O linking is
executed by a single access control unit. A hardware zone works independently of the
Access Manager, and consequently, cannot be armed or disarmed from Security
The Health history task is a
maintenance task that reports on health issues.
The Health Monitor role monitors system entities such as
servers, roles, units, and client applications for health issues.
The Health statistics task is a
maintenance task that gives you an overall view of the health of your system by
reporting on the availability of selected system entities such as roles, video units,
and access control units.
High availability is a design approach that enables a system
to perform at a higher than normal operational level. This often involves failover and
A hot action is an action mapped to a PC keyboard function key
(Ctrl+F1 through Ctrl+F12) in Security
Desk for quick access.
A hotspot is a map object that represents an area on the map
which requires special attention. Clicking on a hotspot displays associated fixed and
An identity provider is a trusted, external system that
administers user accounts, and is responsible for providing user authentication and
identity information to relying applications over a distributed network.
The Import tool is the tool that you can use to import
cardholders, cardholder groups, and credentials from a comma-separated values (CSV)
An inactive entity is an entity that is shaded in red in the
entity browser. It signals that the real world entity it represents is either not
working, offline, or incorrectly configured.
An incident is an unexpected event reported by a Security
Incident reports can use formatted text and include events and entities as support
The Incidents task is an investigation
task that you can use to search, review, and modify incident reports created by Security
An interface module is a third-party security device that
communicates with an access control unit over IP or RS-485, and provides additional
input, output, and reader connections to the unit.
An interlock (also known as sally port or airlock) is an
access restriction placed on a secured area that permits only one perimeter door to be
open at any given time.
An intrusion detection area entity represents a
zone (sometimes called an area) or a partition (group of sensors) on an intrusion
Intrusion detection area
The Intrusion detection area
activities task is an investigation task that reports on activities
(master arm, perimeter arm, duress, input trouble, and so on) in selected intrusion
An intrusion detection unit entity represents an
intrusion device (intrusion panel, control panel, receiver, and so on) that is monitored
and controlled by the Intrusion Manager role.
Intrusion detection unit
The Intrusion detection unit
events task is an investigation task that reports on events (AC fail,
battery fail, unit lost, input trouble, and so on) related to selected intrusion
The Intrusion Manager role monitors and controls
intrusion detection units. It listens to the events reported by the units, provides live
reports to Security Center, and logs the events
in a database for future reporting.
An intrusion panel (also known as alarm
panel or control panel) is a wall-mounted unit where the alarm sensors
(motion sensors, smoke detectors, door sensors, and so on) and wiring of the intrusion
alarms are connected and managed.
Also known as: alarm
The I/O configuration task is a
maintenance task that reports on the I/O configurations (controlled access points,
doors, and elevators) of access control units.
I/O (input/output) linking is controlling an output relay based on
the combined state (normal, active, or trouble) of a group of monitored inputs. A
standard application is to sound a buzzer (through an output relay) when any window on
the ground floor of a building is shattered (assuming that each window is monitored by a
"glass break" sensor connected to an input).
An IP camera is a video encoder unit incorporating a
IPv4 is the first generation Internet protocol using a 32-bit address
IPv6 is a 128-bit Internet protocol that uses eight groups of four
hexadecimal digits for address space.
Keyhole Markup Language
Keyhole Markup Language (KML) is a file format
used to display geographic data in an Earth browser such as Google Earth and Google
Keyhole Markup Language (KML)
A license key is the software key used to unlock the Security Center software. The license key is specifically generated for each computer where the
Directory role is installed. To obtain your license key, you need the System ID
(which identifies your system) and the Validation key (which identifies your
A license plate inventory is a list of license plate
numbers of vehicles found in a parking facility within a given time period, showing
where each vehicle is parked (sector and row).
Load balancing is the distribution of workload across multiple
Logical ID is a unique ID assigned to each entity in the system for
ease of reference. Logical IDs are only unique within a particular entity
A macro is an entity that encapsulates a C# program that adds
custom functionalities to Security Center.
The main server is the only server in a Security Center
system hosting the Directory role. All other servers on the system must connect to the
main server to be part of the same system. In a high availability configuration where
multiple servers host the Directory role, it is the only server that can write to the
A map link is a map object that brings you to another map with a
Map mode is a Security
Desk canvas operating mode that replaces tiles
and controls with a geographical map showing all active, georeferenced events in your
system. Switching to Map mode is a feature that comes with
AutoVu™, Correlation, or Genetec Mission
Control™, and requires a license for one of these
Map objects are graphical representations on your maps of
Security Center entities or geographical features, such as cities, highways, rivers, and so
on. With map objects, you can interact with your system without leaving your
A map view is a defined section of a map.
Master arm is arming an intrusion detection area in such a way that all sensors attributed to the area would set the alarm off if one of them is triggered.
Also known as: Away
The Media Router role is the central role that handles all
stream requests (audio and video) in Security Center.
It establishes streaming sessions between the stream source, such as a camera or an Archiver,
and its requesters (client applications). Routing decisions are based on the location (IP
address) and the transmission capabilities of all parties involved (source, destinations,
networks, and servers).
(Obsolete as of SC 5.8 GA) Mobile Admin is a web-based
administration tool used to configure the Mobile Server.
Official name of the map-based Security Center mobile application for Android and
A mobile credential is a credential on a smartphone that uses
Bluetooth or Near Field Communication (NFC) technology to access secured
Mobile License Plate Inventory
Mobile License Plate Inventory (MLPI) is
Patroller™ software installation that is
configured for collecting license plates and other vehicle information for creating and
maintaining a license plate inventory for a large parking area or parking
Mobile License Plate Inventory (MLPI)
The Mobile Server role provides Security Center access on mobile
A monitor group is an entity used to designate analog
monitors for alarm display. Besides the monitor groups, the only other way to display
alarms in real time is to use the Alarm monitoring task in Security
Monitor ID is an ID used to uniquely identify a workstation screen
controlled by Security
The Monitoring task is an operation task
that you can use to monitor and respond to real-time events that relate to selected entities.
Using the Monitoring task, you can also monitor and respond to
Motion detection is the feature that watches for changes in a
series of video images. The definition of what constitutes motion in a video can be
based on highly sophisticated criteria.
The Motion search task is an
investigation task that searches for motion detected in specific areas of a camera's
field of view.
A motion zone is a user defined areas within a video image where
motion should be detected.
Move unit tool is used to move units from one manager role to
another. The move preserves all unit configurations and data. After the move, the new
manager immediately takes on the command and control function of the unit, while the old
manager continues to manage the unit data collected before the move.
The network entity is used to capture the characteristics of the
networks used by your system so that proper stream routing decisions can be
Network address translation is the process of
modifying network address information in datagram (IP) packet headers while in transit across
a traffic routing device, for the purpose of remapping one IP address space into
network address translation (NAT)
The network view is a browser view that illustrates your network
environment by showing each server under the network they belong to.
The notification tray contains icons that allow quick access
to certain system features, and also displays indicators for system events and status
information. The notification tray display settings are saved as part of your user
profile and apply to both Security
Desk and Config
Omnicast™ is the IP video management system
(VMS) that provides organizations of all sizes the ability to deploy a surveillance
system adapted to their needs. Supporting a wide range of IP cameras, it addresses the
growing demand for HD video and analytics, all the while protecting individual
Omnicast™ compatibility pack is the software component
that you need to install to make Security Center
compatible with an Omnicast™ 4.x system. Please note Omnicast™ 4.8 has reached End of Life.
For more information, see the Genetec™ Product Lifecyle
Federation™ role connects an Omnicast™ 4.x system to Security Center. That way, the Omnicast™ entities and events can be used in your
Security Center system. Please note
Omnicast™ 4.8 has reached End of Life. For more information, see the Genetec™ Product Lifecyle page.
An output behavior is an entity that defines a custom
output signal format, such as a pulse with a delay and duration.
A parking facility entity defines a large parking area
as a number of sectors and rows for the purpose of inventory tracking.
A partition is an entity in Security Center that defines a set of entities that
are only visible to a specific group of users. For example, a partition could include
all areas, doors, cameras, and zones in one building.
The People counting task is an
operation task that keeps count in real-time of the number of cardholders in all secured
areas of your system.
Perimeter arm is arming an intrusion detection area in such a way that only sensors attributed to the area perimeter set the alarm off if triggered. Other sensors, such as motion sensors inside the area, are ignored.
(Obsolete) Plan Manager is a module of Security Center that provides interactive mapping
functionality to better visualize your security environment. The Plan Manager module has
been replaced by the Security Center role, Map
Manager, since version 5.4 GA.
A plugin (in lowercase) is a software component that adds a
specific feature to an existing program. Depending on the context, plugin can refer
either to the software component itself or to the software package used to install the
A plugin role adds optional features to Security Center. A plugin role is created by using
the Plugin role template. By default, it is represented by an orange puzzle piece
in the Roles view of the System task.
Before you can create a plugin role, the software
package specific to that role must be installed on your system.
Point of sale
Point of sale (POS) is a system that typically refers to the
hardware and software used for checkouts - the equivalent of an electronic cash
register. These systems are used to capture detailed transactions, authorize payments,
track inventory, audit sales, and manage employees. Point of sale systems are used in
supermarkets, restaurants, hotels, stadiums, casinos, retail
Point of sale (POS)
The primary server is the default server chosen to perform
a specific function (or role) in the system. To increase the system's fault-tolerance, the
primary server can be protected by a secondary server on standby. When the primary server
becomes unavailable, the secondary server automatically takes over.
private IP address
A private IP address is an IP address chosen from a
range of addresses that are only valid for use on a LAN. The ranges for a private IP
address are: 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.16.255.255, and 192.168.0.0
to 192.168.255.255. Routers on the Internet are normally configured to discard any
traffic using private IP addresses.
A private task is a saved task that is only visible to the
user who created it.
Privileges define what users can do, such as arming zones,
blocking cameras, and unlocking doors, over the part of the system they have access
A public task is a saved task that can be shared and reused among multiple Security Center users.
A reader is a sensor that reads the credential for an access control
system. For example, this can be a card reader, or a biometrics scanner.
Recording mode is the criteria by which the system
schedules the recording of video streams.
There are four possible recording modes:
- Continuous. Records continuously.
- On motion/Manual. Records according to motion detection settings, and when a user
or system action requests it.
- Manual. Records only when a user or system action requests it.
- Off. No recording is permitted.
Recording state is the current recording status of a given
camera. There are four possible recording states: Enabled, Disabled,
Currently recording (unlocked), and Currently recording
A redirector is a server assigned to host a redirector agent
created by the Media Router role.
A redirector agent is an agent created by the Media Router
role to redirect data streams from one IP endpoint to another.
Redundant archiving is an option to enhance the
availability of video and audio archives during failover and to protect against data
loss. If you enable this option, all servers assigned to an Archiver role archive video,
and audio, at the same time.
The Remote task is an operation task that
you can use to remotely monitor and control other Security
Desk applications in your system that
are running the Monitoring task or the Alarm
The Report Manager role automates report emailing and
printing based on schedules.
The report pane is one of the panes found in the Security
Desk workspace. It displays query
results or real-time events in a tabular form.
request to exit
Request to exit (REX) is a door release button normally located
on the inside of a secured area that when pressed, allows a person to exit the secured
area without having to show any credential. This can also be the signal from a motion
detector. It is also the signal received by the controller for a request to
request to exit (REX)
A role is a software component that performs a specific job within
Security Center. To execute a role, you must assign one or more servers to host
roles and units view
The roles and units view is a browser view that lists the
roles on your system with the units they control as child entities.
A route is a setting that configures the transmission capabilities
between two end points in a network for the purpose of routing media
A schedule is an entity that defines a set of time constraints
that can be applied to a multitude of situations in the system. Each time constraint is
defined by a date coverage (daily, weekly, ordinal, or specific) and a time coverage (all day,
fixed range, daytime, and nighttime).
A scheduled task is an entity that defines an action that
executes automatically on a specific date and time, or according to a recurring
Software Development Kit
The Software Development Kit (SDK) is what end-users use to develop
custom applications or custom application extensions for Security Center.
Software Development Kit (SDK)
A secondary server is an alternative server on standby
intended to replace the primary server in case the latter becomes
Also known as: standby
is a truly unified platform that blends IP video surveillance, access control, automatic
license plate recognition, intrusion detection, and communications within one intuitive and
modular solution. By taking advantage of a unified approach to security, your organization
becomes more efficient, makes better decisions, and responds to situations and threats with
The Security Center
Federation™ role connects a remote independent Security Center system to your local Security Center system. That way, the remote system's
entities and events can be used in your local system.
Security Center Mobile
(Obsolete) See Mobile Server and Genetec™ Mobile.
A security clearance is a numerical value used to further
restrict the access to an area when a threat level is in effect. Cardholders can only
enter an area if their security clearance is equal or higher than the minimum security
clearance set on the area.
is the unified user interface of Security Center. It
provides consistent operator flow across all of the Security Center main systems, Omnicast™, Synergis™,
and AutoVu™. The unique task-based design of Security
Desk lets operators efficiently control and
monitor multiple security and public safety applications.
In Security Center, a
server entity represents a computer on which the Genetec™
Server service is
is the web application running on every server machine in Security Center that you use to configure the Genetec™
Server settings. You use this same application
to configure the Directory role on the main server.
A sharing guest is a Security Center system that has been
given the rights to view and modify entities owned by another Security Center system,
called the sharing host. Sharing is done by placing the entities in a global
A sharing host is a Security Center system that gives the right to other
Security Center systems to view and modify
its entities by putting them up for sharing in a global partition.
Synergis™ Appliance Portal
The Synergis™ Appliance Portal
is the web-based administration tool used to configure and administer the Synergis™ appliance and upgrade its
A standard schedule is a schedule entity that can be
used in all situations. Its only limitation is that it does not support daytime or
A strict antipassback is an antipassback option. When
enabled, a passback event is generated when a cardholder attempts to leave an area that
they were never granted access to. When disabled, Security Center only generates
passback events for cardholders entering an area that they never exited.
Supervised mode is an online operation mode of the
interface module where the interface module makes decisions based on the access control
settings previously downloaded from the Synergis™ unit. The interface module reports its
activities in real time to the unit, and allows the unit to override a decision if it
contradicts the current settings in the unit. Not all interface modules can operate in
A synchronous video is a simultaneous live video or playback
video from more than one camera that are synchronized in time.
Synergis™ is the IP access control system (ACS) that
heightens your organization’s physical security and increases your readiness to respond to
threats. Synergis™ supports an ever-growing portfolio
of third-party door control hardware and electronic locks. Using Synergis™, you can leverage your existing investment in
network and security equipment.
(SMC) is an access control appliance of Genetec Inc. that supports various third-party
interface modules over IP and RS-485. SMC is seamlessly integrated with Security Center and can make access control decisions
independently of the Access Manager.
The System task is an administration
task that you can use to configure roles, macros, schedules, and other system entities
A system event is a predefined event that indicates the occurrence
of an activity or incident. System events are defined by the system and cannot be
renamed or deleted.
The System status task is a
maintenance task that you can use to monitor the status of all entities of a given type
in real time and to interact with them.
Tailgating designates one of the following: tailgating
(access control) or tailgating (analytics).
A task is the central concept on which the entire Security Center user interface is built. Each task
corresponds to one aspect of your work as a security professional. For example, use a
monitoring task to monitor system events in real-time, use an investigation task to discover
suspicious activity patterns, or use an administration task to configure your system. All
tasks can be customized and multiple tasks can be carried out simultaneously.
A taskbar is a user interface element of the Security Center client application window, composed
of the Home tab and the active task list. The taskbar can be
configured to be displayed on any edge of the application window.
A task cycling is a Security
Desk feature that automatically
cycles through all tasks in the active task list following a fixed dwell
A task workspace is an area in the Security Center client application window reserved
for the current task. The workspace is typically divided into the following panes:
canvas, report pane, controls, and area view.
temporary access rule
A temporary access rule is an access rule that has
an activation and an expiration time. Temporary access rules are suited for situations
where permanent cardholders need to have temporary or seasonal access to restricted
areas. These access rules are automatically deleted seven days after they expire to
avoid cluttering the system.
Threat level is an emergency handling procedure that a Security
Desk operator can enact on one area or the entire system to deal promptly with a
potentially dangerous situation, such as a fire or a shooting.
A tile is an individual window within the canvas, used to display a
single entity. The entity displayed is typically the video from a camera, a map, or
anything of a graphical nature. The look and feel of the tile depends on the displayed
The tile ID is the number displayed at the upper left corner of the
tile. This number uniquely identifies each tile within the canvas.
Tile mode is the main Security
Desk canvas operating mode that
presents information in separate tiles.
The tile pattern is the arrangement of tiles within the
A tile plugin is a software component that runs inside a
Desk tile. By default, it is
represented by a green puzzle piece in the area view.
Time and attendance
The Time and attendance task is
an investigation task that reports on who has been inside a selected area and the total
duration of their stay within a given time range.
Timed antipassback is an antipassback option. When
Security Center considers a cardholder to be already in an area, a passback event is
generated when the cardholder attempts to access the same area again during the time
delay defined by Presence timeout. When the time delay has expired, the
cardholder can once again pass into the area without generating a passback
A timeline is a graphic illustration of a video sequence,
showing where in time, motion and bookmarks are found. Thumbnails can also be added to
the timeline to help the user select the segment of interest.
A twilight schedule is a schedule entity that supports
both daytime and nighttime coverages. A twilight schedule cannot be used in all
situations. Its primary function is to control video related behaviors.
A unit is a hardware device that communicates over an IP network that can
be directly controlled by a Security Center role.
We distinguish four types of
units in Security Center
- Access control units, managed by the Access Manager role
- Video units, managed by the Archiver role
- ALPR units, managed by the ALPR Manager role
- Intrusion detection units, managed by the Intrusion Manager role
Unit discovery tool
Starting with Security Center 5.4 GA the Unit discovery tool has
been replaced by the Unit enrollment tool.
Unit replacement is a tool that you can use to replace a
failed hardware device with a compatible one, while ensuring that the data associated to the
old unit gets transferred to the new one. For an access control unit, the configuration of the
old unit is copied to the new unit. For a video unit, the video archive associated to the old
unit is now associated to the new unit, but the unit configuration is not
An unlock schedule defines the periods of time when free access
is granted through an access point (door side or elevator floor).
An unreconciled read is an MLPI license plate read that
has not been committed to an inventory.
A user is an entity that identifies a person who uses Security Center applications and defines the rights
and privileges that person has on the system. Users can be created manually or imported
from an Active Directory.
A user group is an entity that defines a group of users who
share common properties and privileges. By becoming member of a group, a user automatically
inherits all the properties of the group. A user can be a member of multiple user groups. User
groups can also be nested.
user level (Security Center)
A user level is a numeric value assigned to users to restrict their ability to perform certain operations, such as controlling a camera PTZ, viewing the video feed from a camera, or staying logged on when a threat level is set. Level 1 is the highest user level, with the most privileges.
A validation key is a serial number uniquely identifying a
computer that must be provided to obtain the license key.
Video analytics is the software technology that is used
to analyze video for specific information about its content. Examples of video analytics
include counting the number of people crossing a line, detection of unattended objects,
or the direction of people walking or running.
A video archive is a collection of video, audio, and
metadata streams managed by an Archiver or Auxilliary Archiver role. These collections
are catalogued in the archive database that includes camera events linked to the
A video decoder is a device that converts a digital video stream
into analog signals (NTSC or PAL) for display on an analog monitor. The video decoder is
one of the many devices found on a video decoding unit.
video encoder (Security Center)
A video encoder is a device that converts an analog video
source to a digital format by using a standard compression algorithm, such as H.264, MPEG-4,
MPEG-2, or M-JPEG. The video encoder is one of the many devices found on a video encoding
A video file is a file created by an archiving role (Archiver
or Auxiliary Archiver) to store archived video. The file extension is G64 or G64x. You
Desk or the Genetec™ Video
Player to view video files.
Video file explorer
The Video file explorer is an
investigation task that you can use to browse through your file system for video files
(G64 and G64x), and to play, convert to ASF, and verify the authenticity of these
A video sequence is any recorded video stream of a certain
A video stream is an entity representing a specific video
quality configuration (data format, image resolution, bit rate, frame rate, and so on)
on a camera.
A video unit is a video encoding or decoding device that is
capable of communicating over an IP network and that can incorporate one or more video
The high-end encoding models also include their own recording and video analytics
capabilities. Cameras (IP or analog), video encoders, and video decoders are all
examples of video units. In Security Center, a video unit refers to an entity
that represents a video encoding or decoding device.
A virtual zone is a zone entity where the I/O linking is done by
software. The input and output devices can belong to different units of different types.
A virtual zone is controlled by the Zone Manager and only works when all the units are
online. It can be armed and disarmed from Security
The Visit details task is an
investigation task that reports on the stay (check-in and check-out time) of current and
The Visitor activities task is an
investigation task that reports on visitor activities (access denied, first person in,
last person out, antipassback violation, and so on).
The Visitor management task is
the operation task that you can use to check in, check out, and modify visitors, as well
as manage their credentials, including temporary replacement cards.
Visual reporting is dynamic charts or graphs in Security
that deliver insights that you act on. You can perform searches and investigate
situations using these visual and user-friendly reports. The visual report data can be
analyzed to help identify activity patterns and enhance your
Visual tracking is a Security Center feature that lets you follow an individual in
live or playback mode through areas of your facility that are monitored by
The VSIP port is the name given to the discovery port of Verint
units. A given Archiver can be configured to listen to multiple VSIP
is a Security Center service installed alongside the
Server service on every server
computer. Genetec™ Watchdog monitors the Genetec™
Server service, and restarts it if abnormal
conditions are detected.
The Web-based SDK role exposes the Security Center SDK methods and
objects as web services to support cross-platform development.
Client is the web application that
gives users remote access to Security Center so
that they can monitor videos, investigate events related to various system entities,
search for and investigate alarms, and manage cardholders, visitors, and credentials.
Users can log on to Web Client from any computer that has a supported web browser
Web Map Service
Web Map Service (WMS) is a standard protocol for serving
georeferenced map images over the Internet that are generated by a map server using data
from a GIS database.
Web Map Service (WMS)
Wheel imaging is a virtual tire-chalking technology that takes
images of the wheels of vehicles to prove whether they have moved between two license
A widget is a component of the graphical user interface (GUI) with
which the user interacts.
Windows Communication Foundation
Windows Communication Foundation (WCF) is
a communication architecture used to enable applications, in one machine or for multiple
machines connected by a network, to communicate. Genetec
Patroller™ uses WCF to communicate wirelessly with
Windows Communication Foundation (WCF)
A zone is an entity that monitors a set of inputs and triggers
events based on their combined states. These events can be used to control output
The Zone activities task is an
investigation task that reports on zone related activities (zone armed, zone disarmed,
lock released, lock secured, and so on).
The Zone Manager role manages virtual zones and triggers
events or output relays based on the inputs configured for each zone. It also logs the zone
events in a database for zone activity reports.
The Zone occupancy task is an
investigation task that reports on the number of vehicles parked in a selected parking
area, and the percentage of occupancy.