Configuration
The Camera Sabotage behavior is configured using the WS5000 software. The behavior must be installed on the encoder before it can be configured.
PROFILES
For each behavior, you can create several custom profiles that contain different settings. Each profile can contain settings that make use of different camera settings. With these profiles, you can set up different scenarios for the behavior. Depending on the behavior, each profile might focus on a different zone, have different sensitivities, detect different object sizes, or trigger an alarm based on different types of motion. For cameras that are
Both the encoder and the EP camera can store up to 25 profiles. Each profile, or scenario, can be started or stopped at any time.
USES AND BENEFITS
Profiles extend the flexibility and power of the behaviors. By creating more than one profile for each behavior, a behavior can be called upon to perform different analytical functions at any time. Assigning descriptive names to the profiles also enhances the usability of behaviors because they are easier to recognize and select from the shortcut menu.
EXAMPLE OF A PROFILE
A security department purchases the Camera Sabotage behavior for use on a fixed camera in a remote office location that employs a security staff during regular business hours only. The behavior is used primarily to monitor a parking lot at the remote office building during hours when the local security staff is off duty.
In this scenario, the behavior should be configured to detect when a camera is repositioned or the lens is covered with a cloth or spray paint during nonbusiness hours. The alarm should be configured to sound within a few seconds of any interference, and the alarm severity should be set to Major or Critical.
The security department creates a profile named Remote Parking Lot Camera Interference and configures the following settings:
Sensitivity: Since the camera monitors the parking lot of a remote office building, the alarm sensitivity is set to 7. The remote office receives only infrequent visitors after hours; therefore, the chance for false alarms is minimal given that excessive movement is unlikely.
Delay before alarm: Since the camera monitors during hours when the security department is off duty, the delay between the violation and the alarm trigger is set to 3 seconds.
Alarm severity: To ensure that alarms are not overlooked, the security department selects the “Enable alarm” check box, and then sets the alarm severity to Major. The security policy at this site requires that higher level alarms are acknowledged by security supervisors thereby minimizing the likelihood that alarms are overlooked.
Refer to Global Settings on page 8 for a detailed explanation of these settings. Profiles can be activated manually at the end of regular business hours.
5 |