- 26 -
Build a Security Application
The Administrator can combine
options on the application page
to perform many useful security
applications. There are two
trigger sources coming from
attached devices, such as for
motion detection. There are also
two kinds of actions responding
to such events, including
uploading snapshots over the
Internet and driving other
attached devices. To upload the
snapshots, the User can choose either email or FTP according to user’s needs. Both
e-mail and FTP use the network settings on the Mail & FTP page. Refer to the definition
section for detail configuration.
1. Click on “Configuration” on the
homepage,
2. Click on “Application” in the left column,
3. Check the weekdays as you need and
give the period of "Snapshots begin" time
and "Snapshots end" time to monitor the
triggering conditions every day,
4. Check the “Event operation”. The
triggering condition can be set to detected
motion or status of the attached device,
5. Set the delay before detecting next
event to avoid continuous false alarms
following the original event,