Abus Secvest User Manual page 26

Table of Contents

Advertisement

Proceed as follows via the web interface:
Log in as an "administrator", click on "Users" on the right hand side and then click on "Add user". You can
now specify a name, type, code and sub-area.
Then login with the access details that have been set or the user details for this user and add "Chip key",
"Remote control", "Panic alarm", "Medical pendant" and "Care pendant". Follow the instructions on the
display.
10.1.1 Editing users
10.1.2 Removing users
10.1.3 Creating a user "threat code"
Important: Your specialist installation contractor must enable the function beforehand to make the "User
threat code" option appear in the user menu. If in doubt contact your specialist installation contractor
if this option does not appear in the menu.
10. User menu
Here, the administrator can edit existing users.
Use the cursor keys to select the user to be edited. Then select "Edit user".
The administrator can only change the name, type and sub-area for other users.
The administrator can select and edit their own "Name", "Code", "Chip key",
"Remote control", "Panic alarm", "Medical pendant" and "Care pendant".
To remove users (such as an employee who has since stopped working at the
premises), select the user in question and remove them from the system.
All components assigned to this user, such as remote controls, are automatically
deleted.
In addition to the user levels of "normal user" and "administrator" you also
have the option of creating a "threat code". This code is used to seemingly
disarm the system during a hold-up when the intruder is watching. A silent
alarm is still triggered in the background, however. For this function to be
enabled, an appropriate communication interface (e.g. telephone or monitoring
station switching) must be set up. The steps for setting up a threat code user are
the same as those for setting up any other user. Proceed as follows:
User menu -> Add user -> Name -> "Threat code user". Create a code for this
user. This code should be known to all users of the alarm panel. Then if an
intruder enters the premises and forces you to disarm the alarm panel, simply
enter this "threat code". The system appears to disarm as normal. The silent
alarm is triggered via telephone switching, however.

Advertisement

Table of Contents
loading

Table of Contents