Professional Documents
Culture Documents
ENI INDONESIA
February 2018
Febran@Bevananda.com
Febran@3code.co.id
Gallagher Training Solutions
3e2737
Rev 2.7 30/05/17
Version 7.70 C892131
Disclaimer
This document gives certain information about products and/or services provided by Gallagher
Group Limited or its related companies (referred to as “Gallagher Group”).
The information is indicative only and is subject to change without notice meaning it may be out
of date at any given time. Although every commercially reasonable effort has been taken to
ensure the quality and accuracy of the information, Gallagher Group makes no representation
as to its accuracy or completeness and it should not be relied on as such. To the extent
permitted by law, all express or implied, or other representations or warranties in relation to
the information are expressly excluded.
Neither Gallagher Group nor any of its directors, employees or other representatives shall be
responsible for any loss that you may incur, either directly or indirectly, arising from any use or
decisions based on the information provided.
Except where stated otherwise, the information is subject to copyright owned by Gallagher
Group and you may not sell it without permission. Gallagher Group is the owner of all
trademarks reproduced in this information. All trademarks which are not the property of
Gallagher Group, are acknowledged.
Copyright © Gallagher Group Ltd 2015. All rights reserved.
Procedure
1. From the Title bar click Viewers…Cardholder Viewer
8. Click Save
9. Click New Operator Group
10. Name the Operator Group…Reception
15. Click OK
16. Select the Privileges tab
17. Click Assign Privileges
22. From the Item Type filter drop down list select Cardholder Viewer
Result
A new Operator Group is created and you are a member of this group.
26. Click Log off
A pop up window displays
Note
The logon and Password will be the initial of your First & Last name (both are case sensitive)
followed by the remaining letters of your surname in lower case
e.g.
Logon Name: JDoe
Password: JDoe
30. Type in your Old Password followed by a New Password and Confirmation
Your new password will be your first name in lower case
31. Click OK
Note
The System View has now changed to All Groups
Note
Each Operator Group’s view and ability to configure is restricted by the privileges configured
within that group.
10. Click OK
Note
System view will now be restricted to the privileges associated to the Guards Operator Group
Notes
While you can add or delete special calendars, you are not able to remove the default
calendar.
Day Categories and calendar(s) should be set up before creating and assigning schedules.
Any new Day Categories assigned to the calendar after creating schedules will need to be
added to each existing schedule individually.
It is recommended that any calendar changes are made out of normal business hours as
they can result in system performance issues, (e.g. events get slower and slower, and then
a barrage of events flood through).
Procedure
1. From the Title bar click Administration…Calendars
2. Click New Calendar or Day Category button from the Navigation Panel
3. Click Day Category
The new Day Category is added to the Viewer Navigation Panel
Note
There are two tabs, (i.e. Colour and History/Notes). The Colour tab displays by default
Result
New Day Category have been created.
Note
Individual dates, (e.g. Monday 25 October) can be assigned to Day Categories on any Calendar,
whereas particular days, (e.g. All Saturdays) can be assigned to Day Categories only on the
Default Calendar.
Procedure
1. From the Title bar click Administration…Calendars
2. Click Default Calendar
3. Click to highlight the Day name
List of available Day Categories will display
4. Select the required Day Category
5. Click OK
6. Click Save
Actual Date
New Year’s Day Sunday 1st January (observed Tuesday 3rd January)
Day after New Year’s Day Monday 2nd January
7. Click OK
Result
The day(s) selected change colour to reflect the colour you assigned to that Day Category.
Note
How individual dates display once assigned to a Day Category depends on the type of Calendar
used.
Day Categories that have been defined in the Default Calendar will display differently in a
Special Calendar, i.e. instead of a date being inside a coloured box it will be in a plain box, (e.g.
26th January in the above example), and in the Assigned Day Categories list it will display in
italics.
There is a limit of 400 special days in the Default Calendar and 400 in each Special (regional)
Calendar. This allows a total of 800 special days to be defined for any one Special Calendar.
When the limit is reached, the system will remove special days in the past without warning,
until all newly selected days can be added. If all special days in the past have been removed
and the limit is still exceeded, the extra newly selected days will not be added and a warning
message will display.
National Public Holidays can be added to the Default Calendar as they will be valid holidays
across the system in all regions.
Introduction
A Schedule is a "list of times and states that control an item". Schedules are one of the three
prerequisites of Access Groups. You must have the Schedules set up before you can link cardholders
to Access Groups.
Note
There are two tabs, (i.e. Schedules and History/Notes). The Schedules tab displays by default
The state/time bar beside the Day Category is an approximate representation of scheduled
times and represents a 24 hour cycle, (i.e. 00:00 to 24:00). Initially the default state will display,
and is editable via the State/time data entry pop-up that also displays.
9. From the drop down list select Deny Access (From 00:00 Midnight)
Note
Multiple state changes may be required to create a suitable schedule.
Result
The browse tool closes and the Weekends Day Category now displays in the Schedule Times grid. The
Day Category is editable via the State/time data entry pop-up
21. Click OK
22. Click Add Day Category
23. Select Public Holiday
24. Click OK
The browse tool closes and the Public Holiday Day Category now displays in the Schedule Times grid.
The Day Category is editable via the State/time data entry pop-up
26. Click OK
27. Click Save
Result
Cardholders are granted access between the hours of 12:00 – 20:00 Weekdays (Monday to
Friday) and denied access on Weekends (Saturday to Sunday) and Public Holidays.
Result
The Email Personal Data Field is created and associated to selected Access Groups
Procedure
1. From the Title bar click Administration…Access Groups
The Access Zone window will phase out and be replaced by the Select Schedule window
10. Tick Site Access 12:00 – 20:00
Note
Schedules can be changed if required. Clicking on the existing schedule will bring forward a pop-up
window where you can replace your existing schedule.
Placing your mouse over the newly assigned Access Zones will prompt a blue information icon
to appear.
Clicking on this icon will open the Doors in Access Zone Access Zone window.
All Doors associated to the Access Zones will be listed e.g.
Result
Change to the Disarmed state Disarm Alarm Zones associated with any Access Zone
associated with the Access Group.
When checked, the Prompt for alarm zone selection
option becomes enabled.
Change to the Armed state Arm Alarm Zones associated with any Access Zone
associated with the Access Group.
When checked, the three options immediately below it
become enabled.
- Prompt for alarm zone selection With this privilege selected, a list of all the available
Alarm Zones will be provided on the Terminal.
- Force-arm alarms zones If an Alarm Zone would not normally set because there
were open Inputs, by having this privilege you can go
to the "Arm Failed" menu on the Terminal and force-
arm alarm zones by pressing the FORCE key.
Note: Without this privilege the FORCE key is not
available on the "Arm Failed" menu.
- Auto-isolate alarm zones If an Alarm Zone would not normally set because there
were open Inputs, by having this privilege you can go
to the "Arm Failed" menu on the Terminal and isolate
the Inputs so that the Alarm Zone will arm, by pressing
the ISOLATE key.
Note: Without this privilege the ISOLATE key is not
available on the "Arm Failed" menu.
Change fence to HV/LF mode Change the HV/LF mode of an Alarm Zone associated
with any Access Zone associated with the Access
Group.
Note
The Terminal Privileges and Terminal Access relates only to Terminals (either a Remote Arming
Terminal or a T20). Therefore, the privileges and access options should only be selected if your
site has Terminals installed and this Access Group will be using them.
<Alt+N> New (In schedules this will open the list of Schedule types)
<Alt+C> Copy
Introduction
The Membership Default section allows you to configure temporary access to an existing Access
Group for 1 group or multiple groups of Cardholders with different duration requirements.
Procedure
1. From the Title bar click Administration…Access Groups
2. Select Site Access 12:00 – 20:00
3. Click the Cardholders tab
4. Under Membership Defaults set the duration for temporary access in From and Until
5. Click Save
6. Click Add Cardholders and assign Lea MacDonald
Lea inherits the time frame set in Membership Defaults
Note
Temporary access can be configured by Access Group or by individual Cardholder.
Operators need the “Run Macros” or “Schedule & Run Macros” operator privilege within a
division in order to run a Macro in that division.
Procedure
1. From the Title bar click Administration…Macros
If your site has multiple Divisions, ensure you assign the correct Division to the Macro.
Refer to “Divisions, Understanding” for further information.
Icons can be changed from the Default settings if required. Assign new Icons by clicking on
Standard Macro Icons and search for the replacement Icons.
3. Name Macro…Arm & Secure Foyer Access Zone
Note
A Macro can be scheduled for a specified period of time e.g. 30mins, until a specified time e.g.
7:58 AM or until the next schedule change.
10. Select For and set time for 1 minute
11. Click OK
21. Test the system by badging Steve Jones at the Foyer Door Entry Reader
Steve Jones has the privilege to Arm/Disarm the Foyer Alarm Zone however to do so he must
now enter a 4 digit pin number (8060).
<Alt+N> New (In schedules this will open the list of Schedule types)
<Alt+C> Copy
3. Locate User Code under Cardholder Details, click in the white box and enter the User Code
4321. A confirmation window will open; confirm with the same User Code 4321
4. Click Save
Procedure
1. Click the Viewer Configuration button
10. Click OK
11. In the Viewer Navigation Panel click the Click to Configure button
Note
Fields can easily be removed or added by clicking the Click to Configure button in the Viewer
Navigation Panel again.
Note
Red horizontal and vertical position lines help the position process.
Note
Certain tiles provide configuration options, Cardholder Details being one, a full explanation of
each Tile and associated options is provided later in this manual.
24. Click on the new Administering Cardholders Viewer button to use the new Viewer
Result
A New Cardholder Management Viewer is created.
Copying Viewers
You can copy an existing Viewer.
1. Click on an existing Viewer from the Toolbar
2. Click the Viewer Configuration button
3. Copy Viewer
This will copy the configurations of the current Viewer and provide a template to either build
from or modify as required.
Note
Size and position of the Start menu, size of the taskbar and screen resolution should all be taken
into account when configuring Viewers. Therefore it is recommended you configure Viewer
either on the machine that they will be used on, or on a representative screen.
Using the Configuration tool we will create a viewer that allows us to manage Alarms in
Command centre.
Procedure
1. Click the Viewer Configuration button
5. Click the Resolution: drop down arrow to set the required screen resolution for the Viewer
This is used to determine the aspect ratio of the screen the Viewer is being configured for. The
default is to use the resolution of the screen on which the Viewer is being configured,
represented by the ‘Current Screen’ option.
6. Click the Display viewer when a new alarm is raised tick box
7. Click Close
12. Click OK
13. In the Viewer Navigation Panel click Click to configure
14. Leave:
Escalation: Both Escalated and Non-escalated Alarms
All Divisions
All Priorities
15. In columns, tick additional options:
Alarm Zone
Cardholder
Event Source
Acknowledged By
Entry Access Zone
21. Click Event Group: from the drop down list select Access Denied
The new Access Division panel title displays in the Panels area
26. Click OK
The Configuration Panel displays again
28. By default the tile is positioned in the top left corner of the Viewer Panel area
Alternatively Tiles can be dragged & dropped from the Tile Toolbox onto the Viewer Panel area
Note
Position the tile in the top left corner of the Viewer Panel area
Note
Each Tile has a Click to Configure option, a number of tiles provide configuration options, other
do not, the Alarm Instructions Tile only allows you to change the title of the tile.
The Viewer Panel name changes to Access Denied and Viewer Panel area is clear and ready to
be populated with the tiles required for Access Denied based alarms.
Note
Configuration ability is governed by Operator privileges.
As an example the information displayed in an Event Trail tile is defined by the configurations
applied in the Event Trail File Configuration panel.
Note
The * by the Viewer in the Navigation Panel disappears indicating that changes have been saved
and the save button becomes inactive, it will activate immediately when another change is
made.
Result
The new Site Alarms Alarm Viewer is created.
Procedure
1. Click on the Viewer Panel you want to modify
2. Click the Viewer Configuration button
3. Configure as required
4. Click Save
5. Right click on the Viewer Configuration button
6. Click Reload Viewer
Accessing Reports
Command Centre reporting allows operators to move between viewer-based security
management tasks and reporting tasks, which mimics the viewer toolbar concept. Operators
can add frequently used or favourite reports; this makes any report quickly accessible from
anywhere in Command Centre.
The Find Reports viewer is available to every Operator privileged to run a Command Centre
report. Operating in a similar manner to the Cardholder Viewer, an Operator can type any part
of the report’s name to return matching results which are filtered automatically as the Operator
continues to type. Alternately, an Operator can find a report by scrolling through the list of
reports available to them.
Procedure
1. From the Title bar click Reports
2. Click the Report Configuration button
A new report will display in the window. By default, the report is named Report 1
5. Change the name to Cardholder by Access Zone
Note
The name will also change in the Cardholder Report list under the Toggle tab.
13. Tick the Allow change when report is run tick box
14. Click OK
28. Drag & drop the Report from the search results onto the favourites tool bar
Note
Cardholder Contextual Reports must have previously been configured with the Cardholder Is
filter.
Note
If the Cardholder by Access Zone Report is the only report configured in the system with the
Cardholder is filter then this report will be automatically generated.
If there are numerous reports with the same filter then a pop-up window will display with the
applicable options.
Note
Contextual Reports can also be run directly from a Site Plan
A new report will display in the window. By default, the report is named Report 1
4. Change the name to Access Denied by Access Group
5. Double click on Event occurred today
Note
Clicking on an orange the bar will give the option to remove the bar. Clicking on the empty bar
space will insert a new orange bar
Note
Multiple bars can be inserted then dragged across to change the time on the individual days.
Note
Events that have “+” have sub category events to choose from.
Note
Ticking the “Allow change when report is run” will allow the filter to be changed when the
report is run at a later date.
20. From the Column filter drop down list click Cardholder Personal Data Fields
22. Click on the symbol by Access Group and click Group by this column
23. Click on the symbol by Access Group and click Show count
Exercise
1. From the Title bar click Viewers…Cardholder Viewer; search John Spears.
In the Cardholder Cards tile, click on the drop down symbol and then tick the Card
Trace tick box
2. Badge Emma Bennett at the stores door and Badge Peter Wilson at both the Stores and
Foyer Door
3. Badge and enter John Spears though Foyer door and then though the Stores door
4. From your tool bar click your Access Denied by Access Group Report
5. Click on the Reload tab to preview your Access Denied by Access Group Report
Report Configuration
A privileged operator can configure summary activity reports including:
Bar, Line or Pie graph of events by Event Group, Event Type, Event Source or Event Priority
Optionally show events trended through time counted by minute, hour, day, week, month
or year
Optionally display a legend and data values (or percentages when displaying a Pie graph)
Restrict the output to only display values with the highest event counts if required (Display
Top X) with an ability to display or discard other values
Additionally or if required exclusively display a data table summarising the event counts for
each data point.
Page layout, including A3, A4, Letter, and Ledger with portrait or landscape (default)
orientation
File output type including CSV (of the data table with or without headers), Excel, Word ,
PDF or XPS
Filter by any filter available in the Activity report
Display of header, footer and cover page (including logo and disclaimer) if desired.
Report scheduling and running from a macro
Save selected report page (by default the graph) to an image file (*.jpeg)
Running reports from items on a status tile or site plan, or from cardholders on a
cardholder viewer
Note
Report must have an applicable filter with ‘Allow change when report is run’ checked
By default a graph will be displayed along with a legend and data values for each data point,
however the data table will not be shown. Regardless of whether or not the table data is
displayed, configuration of the data table is not possible in the Summary Activity Report except
for the option to ‘Group by time’. This option is only applicable when trending events by time.
Each visitor will be shown in the evacuation report based on the following rule:
If a visitor has been assigned a card and is using that card, that visitor will be shown in their
badged location. If the visitor does not have a card (or has not used their assigned card) that
visitor will be shown in the location of their host (either their escort if assigned, else their
meeting with).
Procedure
1. From the Title bar click Reports
2. Click the Report Configuration button
Procedure
1. Log onto Command Centre
2. Click the Reports tab
A new report will display in the window. By default, the report is named Report 1
Note
Listed under the toggle tab are all the reports that have been created or are pre-made samples.
These are grouped under Cardholder Report or the Activity Report; their order can be changed
with the toggle tab.
Note
The report can be scheduled and emailed under the “Schedule/Macro Output” tab.
Filters
Filters can define selection criteria based on cardholder information such as personal data field
content, as well as event-based information such as the Cardholders who have been denied
access at a selected door within the last week.
Cardholder filters can be defined based on:
Personal data field information such as the Cardholder’s department, company, or date of
birth *
Card activation or expiry dates, such as card expiry due within the next 4 weeks
Card type *
Card number range
Card status such as active or inactive
Cardholder authorisation status
Competency status
Cardholder’s last entered zone *
Time of the cardholder’s last access attempt (e.g. more than 3 months ago)
Cardholder creation or last modification dates
Cardholder’s access group membership *
Card Last printed or encoded date
13. Click OK
14. Click Configure Layout
15. From the Column Selection tick Access Group and Card Activation
4 Columns will now be displayed First Name and Last Name (Default) plus Access Group and
Card Activation (Selected)
18. Click on the symbol by Access Group and click Group by this column
29. Drag & drop the Report from the search results onto the favourites tool bar
Voltage Report
Introduction
In version 7.30 Gallagher introduces graphical fence voltage reporting to Command Centre,
providing a visual representation of voltages for up to 50 fence zones on each graph. Voltage
data can be represented in either graph or table output. These voltage reports can be
scheduled, printed or emailed and utilise other common reporting functionality such as
headers, footers, page sizing and cover page.
Licensing
Command Centre voltage reports are available on any v7.50 Command Centre workstation
where the site is using fence controllers.
Report Configuration
A privileged operator can configure voltage reports including:
Display a legend
Additionally or if required exclusively display a data table of the logged voltages
Page layout, including A3, A4, Letter, and Ledger with portrait or landscape (default)
orientation
File output type including CSV (of the data table with or without headers), Excel, Word ,
PDF or XPS
Filter fence zones from 1 up to a maximum of 50 zones
The spot monitor viewer can be controlled automatically by the system raising an alarm that
has an existing pre-configured rule set or manually by a (suitably privileged) operator selecting
an alarm within the alarm viewer that has an existing pre-configured rule set.
It is possible to assign spot monitor panels based on an alarm priority and an event source. Spot
monitor panels are designed to contain detailed information and be displayed to an operator in
response to an alarm. For example, an alarm is triggered, causing related cameras to display
alongside site plans, item and status information in the viewer.
All doors, inputs or fence zones can have nearby cameras associated to them, allowing specific
selection of cameras to be tiled across the panel, based on the source of the alarm.
Automated Display
Spot Monitor Panels can be configured for a specific combination of Alarm Priority and Event
source, it is now possible to define different panels for Alarms with different Priorities at
specific Event Sources for example a Door allowing a very specific selection of information
displayed in response to alarms.
Manual Operator
Any operator with the required privileges can select an alarm and have it displayed on a larger
monitor for closer scrutiny. This enables multiple operators to collaborate and access the
information they need, in a timely manner.
11. Click OK
12. In the Viewer Navigation Panel click the Click to Configure button
16. Under Event Sources tick the Specific Sources radio button
New Rule Definition window expands with the option to Add Event Sources
Note
Event Sources can easily be removed or added by clicking the Click to configure button in the
Viewer Navigation Panel again.
22. Click OK
23. From the Viewer Navigation Panel click the Currently viewing panel: drop down arrow
24. Select Foyer Alarm Activation
32. Click on the new Spot Monitor Viewer button to use the new Viewer
Result
A New Spot Monitor Viewer is created
Performing Backups
Introduction
SQL Server performs the backups of Gallagher Command Centre. Therefore in order to get SQL
Server to write to the destination you specify, and for the backup to succeed, you have to run
the SQL Server service under the account of a user who has permission to do so.
If your work station is remote, then the path you specify is relative to the SQL Server machine
and not your local machine.
Procedure
1. Click File from the menu bar
2. Click Backup
By default the General tab of the Backup window displays
Note
Although not required, verifying a backup checks that the backup is intact physically, and that
you can reply on your backup in the event you need to use it. Verifying a backup involves:
Checking the backup set to ensure that all files have been written.
Checking to ensure that the files in the backup are readable.
Verifying a backup does not check that the structure of the data contained within the backup
set is correct. For example, although the backup set may have been written correctly, it may be
possible for some type of database integrity problem to be present within the database files
that comprise the backup set. To verify the structure of the data before creating a backup, you
can perform database consistency checks.
Field Description
Backup Set Description This provides descriptive or identifying text for the result of a
backup operation.
Note:
If you type [TIME] in the Backup Set Description field the actual
server date and time will replace it when the backup is created.
Note
These fields are embedded in the actual .Backup file. When browsing for a backup set (.Backup
file) using the CC Restore program, these names and descriptions appear at the bottom of the
browse window, allowing a user to identify a backup even if the file itself has been renamed.
Weekly on the day of the week you selected as the 'Start date' on the
calendar, (e.g. in the previous screen example, the 13th December
was selected, which is a Saturday. Therefore, a backup would always
occur on a Saturday).
Monthly on the date selected as the 'Start date' on the calendar, (e.g. in the
previous screen example, the 13th December was selected,
therefore a backup would always occur on the 13th of the month).
Note:
If you select a day which does not occur in every month, (e.g. Day
31), the backup will occur on the final day of those months.
Note
The date specified is the first time the backup will occur, (e.g. a day six months in the future
could be specified for backups to start). If a date/time that has passed was specified, the backup
would take a ‘best guess’ as to when the backup was intended to occur, (e.g. if the 9th
December 2008 was selected with a monthly schedule, and today’s date is the 22nd December
2008, then the backup would advance the first backup time to the 9th January 2009).
Introduction
This procedure enables you to restore the working system from a backup file record; therefore
a backup must already have been performed.
If you have performed a backup over the network, the backup should be copied to a non-
network drive before restoring. A restore can only be performed on the Server.
Procedure
1. From the Start menu click Command Centre Restore
The Restore window displays
The restore utility requires exclusive access to the CC Central database and needs to shut down
the following services to allow this:
Command Centre Service
Controller Service
Bootstrap Protocol Services
Import – Export Service
Intercom Service
OPC Data 3.0 Service
Visitor Management Service
5. Click the Start button
A message displays indicating that the Services need to be stopped.
6. Click the Yes button
A message displays stating Command Centre will be shut down
7. Click OK
The Restore starts. When the Restore Progress bar reaches 100% the Restore is complete, and a
pop-up message “The Restore has completed. Do you want to restart the Command Centre
Services?” displays
8. Click Yes
Once the Services have restarted, another pop-up message “Restore completed successfully!”
displays.
9. Click OK
10. Click Exit
Result
A restore of a backup file is complete.
Hint
Restore from Windows Explorer.
An alternative method of restoring a backup is to double-click on the Backup file from Windows
Explorer on the Server machine. The Restore window displays and you complete the previous
procedure described, with the exception of selecting the Backup file, as the name is already
displayed in the Database File Location (From) field.