Integration overview for the UTC Advisor Master and Advanced extension - UTC Advisor Master and Advanced 3.0

UTC Advisor Master and Advanced Intrusion Panel Extension Guide 3.0

Applies to
UTC Advisor Master and Advanced 3.0
Last updated
2021-06-18
Content type
Guides > Plugin and extension guides
Language
English (United States)
Product line
Ecosystem (add-ons) > UTC Advisor Master and Advanced
Version
3.0

You can integrate Advisor Master and Advisor Advanced intrusion panels into Security Center using the UTC Advisor Master and Advanced extension by following a sequence of steps.

The following table lists the tasks required for the integration with Security Center, and how to verify that the integration was successful.
Step Task Where to find more information
Understand prerequisites and key issues before deploying
1 Learn what you can do using the extension.
2 Before installing the extension, read the release notes to learn about the new features, the known issues, and the limitations.
3 Learn about the different components and how they connect together.
4 Ensure that the server where the extension will be installed meets the recommended system requirements and is running a compatible version of Security Center.
Prepare Security Center
5 In Security Center, create a georeferenced map. Maps can enhance your situation awareness as you represent and control your security devices directly on maps.
6 Verify that the Security Center license has a valid certificate for the extension. Go to the Config Tool home page, click About > Certificates, and confirm that UTC Advisor Master and Advanced is in the list.
Deploy the extension
7 On a Security Center server, download the extension and install it.
8 Grant users the privileges that they need to use the extension.
  • Grant users the appropriate "intrusion" privileges and "alarm" privileges. Tip: You can search the privileges by keywords.
  • Grant operators the UTC Advisor Master and Advanced privileges.
9 If not yet done, create the Intrusion Manager role for managing the UTC Advisor Master and Advanced extension.
10 (Optional) Change the extension configuration to suit your particular needs.
11 (Optional) Enable the Forced set option on the panel, so you can perform bypass arm commands on intrusion detection areas in Security Center.
Add and configure the devices
12 Prepare the panel before integration.
13 Create an intrusion detection unit to represent a panel in Security Center.
14 Import or manually add the areas, inputs, outputs, and modules that are connected to the panel.
15 Enable the logs for polling and events.
16 In Map designer, add the unit and related entities to your maps.
17 Configure how incoming events from units are displayed in Security Desk.
18 Add the intrusion detection areas to the map.
19 Configure how incoming events from areas are displayed in Security Desk.
20 (Optional) Define the rules for arming and disarming areas.
21 (Optional) Configure how incoming events from inputs are displayed in Security Desk.
22 (Optional) Configure outputs on the panel, so you can trigger them in Security Center.
23 (Optional) Configure how incoming events from peripheral modules, such as keypads, are displayed in Security Desk.
Confirm that the integration works as expected
24 In Security Desk, confirm that you can monitor the devices.
25 Confirm that you see events from integrated devices in the supported reports.
Set up your operator workstations
26 Install the extension on all Security Desk workstations.
27 In the Monitoring task of Security Desk, add the UTC Advisor Master and Advanced entities to the Event monitoring list, and enable alarm monitoring.
28 Confirm that the operator workstations function as expected. If it does, you have successfully completed the integration.
  • Do step 24 and 25.