Granting user privileges for an intrusion panel integration - SPC intrusion panel 3.1

Vanderbilt SPC Intrusion Panel Extension Guide 3.1

Applies to
SPC intrusion panel 3.1
Last updated
2023-07-20
Content type
Guides > Plugin and extension guides
Language
English
Product
SPC intrusion panel
Version
3.1

For administrators to install and configure the extension in Config Tool, and for operators to monitor intrusion detection units in Security Desk, the correct user privileges must be granted to their user accounts.

What you should know

This task lists the minimum privileges required to monitor and control intrusion detection units in Security Center.
NOTE: You might require more privileges, depending on the tasks you want to perform. For a description of all user privileges, see Security Center Privileges.

Procedure

  1. From the Config Tool home page, open the User management task.
  2. Select the relevant user, and click the Privileges tab.
  3. Set the following privileges to Allow.
    Privilege Task
    Application privileges
    Config Tool To use Config Tool.
    Security Desk To use Security Desk.
    Administrative privileges > Physical entities
    View intrusion detection area properties To view the intrusion detection area configuration pages in Config Tool.
    Modify intrusion detection area properties To modify the intrusion detection area configurations in Config Tool.
    Add and delete intrusion detection areas To add or delete intrusion detection areas in Config Tool.
    View intrusion detection unit properties To view the intrusion detection unit configuration pages in Config Tool.
    Modify intrusion detection unit properties To modify the intrusion detection unit configurations in Config Tool.
    Add and delete intrusion detection units To add or delete intrusion detection units in Config Tool.
    Reset intrusion detection units To restart the unit.
    Upgrade intrusion detection units To upgrade the firmware and platform components of an intrusion detection unit.
    Administrative privileges > Alarm management
    View alarm properties To view alarm configuration pages in Config Tool.
    Modify alarm properties To modify alarm configuration settings in Config Tool.
    Add and delete alarms To add or delete alarms in Config Tool.
    Task privileges > Administration
    Intrusion detection To use the Intrusion detection task in Security Desk.
    Task privileges > Operation
    Monitoring To use the Monitoring task in Security Desk.
    Task privileges > Investigation
    Intrusion detection area activities To use the Intrusion detection area activities task in Security Desk.
    Task privileges > Maintenance
    Intrusion detection unit events To use the Intrusion detection unit events task in Security Desk.
    Task privileges > Alarm management
    Alarm monitoring To use the Alarm monitoring task in Security Desk.
    Alarm report To use the Alarm report task in Security Desk.
    Action privileges > Alarms
    Acknowledge alarms To acknowledge active alarms in Security Desk.
    Forward alarms To forward alarms in Security Desk.
    Snooze alarms To snooze active alarms in Security Desk.
    Trigger alarms To trigger alarms in Security Desk.
    Action privileges > Intrusion detection
    Acknowledge intrusion alarm To acknowledge alarms in intrusion detection areas in Security Desk.
    Arm To arm an intrusion detection area from Security Desk or Config Tool.

    Replaces the "Arm and disarm intrusion detection areas" privilege found in Security Center 5.7 SR3 and earlier.

    Bypass Bypass an intrusion detection area from Security Desk or Config Tool.
    Force Force arm an intrusion detection area from Security Desk or Config Tool.
    Disarm Disarm an intrusion detection area from Security Desk or Config Tool.

    Replaces the "Arm and disarm intrusion detection areas" privilege found in Security Center 5.7 SR3 and earlier.

    Silence intrusion alarm To silence alarms in intrusion detection areas in Security Desk or Config Tool.
    Trigger intrusion alarm To trigger alarms in intrusion detection areas in Security Desk or Config Tool.