User's Manual
211
Step 5 Click to enable tampering alarm.
Step 6 Click
Schedule
to select a schedule from the drop-down list.
The system triggers corresponding alarm actions only during the alarm deployment
period.
You can select an existing schedule from the
Schedule
drop-down list. You can also add a
new schedule.
Step 7 Click
Select
next to
Event Linkage
to set alarm actions.
Step 8 Click
Save
.
8.3.3.2 Offline Alarm
When the remote device is disconnected from the IVSS, the system triggers an alarm.
Procedure
Step 1 Log in to the PC client.
Step 2 Click on the upper-right corner and then click
Event
.
You can also click
Event
from the configuration list on the home page.
Step 3 Select a remote device from the device tree.
Step 4 Select
Offline
>
Offline
.
Figure 8-44 Offline alarm
Step 5 Click to enable offline alarm.
The offline alarm is enabled by default. You can skip this step.
Step 6 Click
Schedule
to select a schedule from the drop-down list.
The system triggers corresponding alarm actions only during the alarm deployment
period.