Threat Level Influence - Chamberlain IPAC Administrator's Manual

Table of Contents

Advertisement

IPAC Server Administrator's Manual

Threat Level Influence

NOTE:
The default setting for permissions, devices, and schedules
concerning threat levels is Ignore. This means that unless the
administrator edits it, the permission, device, or schedule will
continue to function as programmed even if the threat level is
changed. If an administrator wants a permission, device, or
schedule to respond to a change in threat level, the administrator
must edit it to do so.
Change of a Threat Level may affect the following:
Schedules can be set to be active at, at or more severe, or at or less severe than a
given threat level.
Permissions to devices (configured on the Edit Group Permissions page) can be set
to be active at, at or more severe, or at or less severe, than a given threat level.
Floors and doors owned by the account that use the threat level can be set to ignore
their unlocked schedules at, at or more severe, or at or less severe than a given
threat level.
Programmable devices can be configured to be only active at, at or more severe, or
at or less severe than a given threat level (in addition to their configured schedule).
Elevators, valid credential devices, and doors owned by the account that use the
threat level can be configured to require 2-factor authentication at, at or more
severe, or at or less severe than a given threat level.
Muster points owned by the account that use the threat level can be configured to
be active at, at or more severe, or at or less severe than a given threat level.
Every page of the application will display a large, colored banner that contains a
pre-configured message notifying the owner that a threat level has been changed,
unless the threat level has been changed to the default threat level which shows no
banner message. The message is customized when either a new account is created
or an existing account is edited.
The Activity Log reflects the date and time the threat level was changed, as well as
the Administrator who made the change.
Email notifications can be configured to alert administrators to changes in threat
level.
Administrator Roles can be configured to function at, at or more severe, or at or
less severe than a given threat level.
233
Page 233 of 334

Advertisement

Table of Contents
loading

Table of Contents