You can integrate Advisor Master and Advisor Advanced intrusion panels into Security Center using the UTC Advisor Master and Advanced extension by following a sequence of steps.
The following table lists the tasks required for the integration with Security Center, and how to verify that the
integration was successful.
| Step | Task | Where to find more information |
|---|---|---|
| Understand prerequisites and key issues before deploying | ||
| 1 | Learn what you can do using the extension. | |
| 2 | Before installing the extension, read the release notes to learn about the new features, the known issues, and the limitations. | |
| 3 | Learn about the different components and how they connect together. | |
| 4 | Ensure that the server where the extension will be installed meets the recommended system requirements and is running a compatible version of Security Center. | |
| Prepare Security Center | ||
| 5 | In Security Center, create a georeferenced map. Maps can enhance your situation awareness as you represent and control your security devices directly on maps. | |
| 6 | Verify that the Security Center license has a valid certificate for the extension. Go to the Config Tool home page, click , and confirm that UTC Advisor Master and Advanced is in the list. |
|
| Deploy the extension | ||
| 7 | On a Security Center server, download the extension and install it. | |
| 8 | Grant users the privileges that they need to use the extension.
|
|
| 9 | If not yet done, create the Intrusion Manager role for managing the UTC Advisor Master and Advanced extension. | |
| 10 | (Optional) Change the extension configuration to suit your particular needs. | |
| 11 | (Optional) Enable the Forced set option on the panel, so you can perform bypass arm commands on intrusion detection areas in Security Center. | |
| Add and configure the devices | ||
| 12 | Prepare the panel before integration. | |
| 13 | Create an intrusion detection unit to represent a panel in Security Center. | |
| 14 | Import or manually add the areas, inputs, outputs, and modules that are connected to the panel. | |
| 15 | Enable the logs for polling and events. | |
| 16 | In the Map designer task, add the intrusion detection area and related entities to your maps. | |
| 17 | Configure how incoming events from units are displayed in Security Desk. | |
| 18 | Add the intrusion detection areas to the map. | |
| 19 | Configure how incoming events from areas are displayed in Security Desk. | |
| 20 | (Optional) Define the rules for arming and disarming areas. | |
| 21 | (Optional) Configure how incoming events from inputs are displayed in Security Desk. | |
| 22 | (Optional) Configure outputs on the panel, so you can trigger them in Security Center. | |
| 23 | (Optional) Configure how incoming events from peripheral modules, such as keypads, are displayed in Security Desk. | |
| 24 | Map and synchronize users on the UTC Advisor Master and Advanced panels with cardholders in Security Center. |
|
| Confirm that the integration works as expected | ||
| 25 | In Security Desk, confirm that you can monitor the devices. | |
| 26 | Confirm that you see events from integrated devices in the supported reports. | |
| Set up your operator workstations | ||
| 27 | Install the extension on all Security Desk workstations. | |
| 28 | In the Monitoring task of Security Desk, add the UTC Advisor Master and Advanced entities to the Event monitoring list and enable alarm monitoring. | |
| 29 | Confirm that the operator workstations function as expected. If they do, you have successfully completed the integration. |
|