You can integrate Advisor Master and Advisor Advanced intrusion panels into Security Center using the UTC Advisor Master and Advanced extension by following a sequence of steps.
The following table lists the tasks required for the integration with Security Center, and how to verify that the
integration was successful.
Step | Task | Where to find more information |
---|---|---|
Understand prerequisites and key issues before deploying | ||
1 | Learn what you can do using the extension. | |
2 | Before installing the extension, read the release notes to learn about the new features, the known issues, and the limitations. | |
3 | Learn about the different components and how they connect together. | |
4 | Ensure that the server where the extension will be installed meets the recommended system requirements and is running a compatible version of Security Center. | |
Prepare Security Center | ||
5 | In Security Center, create a georeferenced map. Maps can enhance your situation awareness as you represent and control your security devices directly on maps. | |
6 | Verify that the Security Center license has a valid certificate for the extension. Go to the Config Tool home page, click , and confirm that UTC Advisor Master and Advanced is in the list. |
|
Deploy the extension | ||
7 | On a Security Center server, download the extension and install it. | |
8 | Grant users the privileges that they need to use the extension.
|
|
9 | If not yet done, create the Intrusion Manager role for managing the UTC Advisor Master and Advanced extension. | |
10 | (Optional) Change the extension configuration to suit your particular needs. | |
11 | (Optional) Enable the Forced set option on the panel, so you can perform bypass arm commands on intrusion detection areas in Security Center. | |
Add and configure the devices | ||
12 | Prepare the panel before integration. | |
13 | Create an intrusion detection unit to represent a panel in Security Center. | |
14 | Import or manually add the areas, inputs, outputs, and modules that are connected to the panel. | |
15 | Enable the logs for polling and events. | |
16 | In the Map designer task, add the intrusion detection area and related entities to your maps. | |
17 | Configure how incoming events from units are displayed in Security Desk. | |
18 | Add the intrusion detection areas to the map. | |
19 | Configure how incoming events from areas are displayed in Security Desk. | |
20 | (Optional) Define the rules for arming and disarming areas. | |
21 | (Optional) Configure how incoming events from inputs are displayed in Security Desk. | |
22 | (Optional) Configure outputs on the panel, so you can trigger them in Security Center. | |
23 | (Optional) Configure how incoming events from peripheral modules, such as keypads, are displayed in Security Desk. | |
24 | Map and synchronize users on the UTC Advisor Master and Advanced panels with cardholders in Security Center. |
|
Confirm that the integration works as expected | ||
25 | In Security Desk, confirm that you can monitor the devices. | |
26 | Confirm that you see events from integrated devices in the supported reports. | |
Set up your operator workstations | ||
27 | Install the extension on all Security Desk workstations. | |
28 | In the Monitoring task of Security Desk, add the UTC Advisor Master and Advanced entities to the Event monitoring list and enable alarm monitoring. | |
29 | Confirm that the operator workstations function as expected. If they do, you have successfully completed the integration. |
|