Integration overview for the UTC Advisor Master and Advanced extension - UTC Advisor Master and Advanced 3.1

UTC Advisor Master and Advanced Intrusion Panel Extension Guide 3.1

Product
UTC Advisor Master and Advanced
Content type
Guides > Plugin and extension guides
Version
3.1
Language
English
Last updated
2023-12-11

You can integrate Advisor Master and Advisor Advanced intrusion panels into Security Center using the UTC Advisor Master and Advanced extension by following a sequence of steps.

The following table lists the tasks required for the integration with Security Center, and how to verify that the integration was successful.
Step Task Where to find more information
Understand prerequisites and key issues before deploying
1 Learn what you can do using the extension.
2 Before installing the extension, read the release notes to learn about the new features, the known issues, and the limitations.
3 Learn about the different components and how they connect together.
4 Ensure that the server where the extension will be installed meets the recommended system requirements and is running a compatible version of Security Center.
Prepare Security Center
5 In Security Center, create a georeferenced map. Maps can enhance your situation awareness as you represent and control your security devices directly on maps.
6 Verify that the Security Center license has a valid certificate for the extension. Go to the Config Tool home page, click About > Certificates, and confirm that UTC Advisor Master and Advanced is in the list.
Deploy the extension
7 On a Security Center server, download the extension and install it.
8 Grant users the privileges that they need to use the extension.
  • Grant users the appropriate "intrusion" privileges and "alarm" privileges. Tip: You can search the privileges by keywords.
  • Grant operators the UTC Advisor Master and Advanced privileges.
9 If not yet done, create the Intrusion Manager role for managing the UTC Advisor Master and Advanced extension.
10 (Optional) Change the extension configuration to suit your particular needs.
11 (Optional) Enable the Forced set option on the panel, so you can perform bypass arm commands on intrusion detection areas in Security Center.
Add and configure the devices
12 Prepare the panel before integration.
13 Create an intrusion detection unit to represent a panel in Security Center.
14 Import or manually add the areas, inputs, outputs, and modules that are connected to the panel.
15 Enable the logs for polling and events.
16 In the Map designer task, add the intrusion detection area and related entities to your maps.
17 Configure how incoming events from units are displayed in Security Desk.
18 Add the intrusion detection areas to the map.
19 Configure how incoming events from areas are displayed in Security Desk.
20 (Optional) Define the rules for arming and disarming areas.
21 (Optional) Configure how incoming events from inputs are displayed in Security Desk.
22 (Optional) Configure outputs on the panel, so you can trigger them in Security Center.
23 (Optional) Configure how incoming events from peripheral modules, such as keypads, are displayed in Security Desk.
24 Map and synchronize users on the UTC Advisor Master and Advanced panels with cardholders in Security Center.
Confirm that the integration works as expected
25 In Security Desk, confirm that you can monitor the devices.
26 Confirm that you see events from integrated devices in the supported reports.
Set up your operator workstations
27 Install the extension on all Security Desk workstations.
28 In the Monitoring task of Security Desk, add the UTC Advisor Master and Advanced entities to the Event monitoring list and enable alarm monitoring.
29 Confirm that the operator workstations function as expected. If they do, you have successfully completed the integration.
  • Do steps 25 and 26.