Managing RSA intrusion incidents - Restricted Security Area Surveillance 3.5

Restricted Security Area Surveillance Plugin Guide 3.5

Restricted Security Area Surveillance 3.5

As the Genetec Mission Control™ owner of an intrusion incident detected by an RSA tracking system, you can use the Incident monitoring task to review the path of the RSA target, view associated video, acknowledge the target manually, or change the state of the incident to automatically acknowledge the target.

Before you begin

Read the Genetec Mission Control™ User Guide so that you understand how to work with the Incident Monitoring task.

What you should know

Any user, not only the incident owner, can use the commands in the RSA zone widget, and the incident can be either active or closed.


  1. In Security Desk, open the Incident monitoring task.
  2. In the dashboard, click , and select the display options as desired.
    Incident Monitoring display options
  3. In the list pane or on the map, click the incident that you want to work on.
  4. At the end of the list, click RSA to open the widget.
    RSA widget in the dashboard of the Incident monitoring task
  5. Using the RSA widget, you can do the following:
    RSA widget
    Information about the target
    A View the target's speed in kilometers per hour, its direction of travel, and the date and time that the target was created.
    Acknowledge ()
    B Acknowledge the target to remove it from the Maps task and the Monitoring task.
    View surrounding cameras ()
    C View video from the cameras associated to this RSA zone.
    Describe target ()
    D Add a description for the target.
    Target type ()
    E Identifies the type of target. Click the icon to change the type.