To help your security personnel quickly respond to a threatening situation, you can define threat levels.
What you should know
The system does not automatically revert to the state it was in before the threat level was set. You must explicitly define the actions that are triggered when the threat is cleared.
- Open the System task, click the General settings view, and click the Threat levels tab.
- At the bottom of the threat level list, click Add an item ().
In the Threat level configuration dialog box, enter the
Name, Description, Logical
ID (optional), and Color of the threat level.
Tip: Choose a distinctive color for each threat level, so that when the threat level is set at the system level and the Security Desk background turns that color, the users can easily identify the threat.
Configure the threat level Activation actions.
These actions are executed by the system when the threat level is set, independently of the privileges and permissions of the user who set the threat level.
Configure the threat level Deactivation actions.
These actions are executed by the system when the threat level is cleared or overwritten by another one, independently of the privileges and permissions of the user who cleared the threat level.
A new threat level () appears in the threat level list.
- Click Apply.
For all users who need to set threat levels, make sure that they are part of the public partition, and make sure that they are assigned the Set threat level user privilege.
After you finish
- To view which threat levels and security clearance are set on each area, use the System status task.
- To find out when threat levels were set and cleared, and who did it, use the Activity trails task.