Detail View

The Detail View enables a detailed representation of the logical or structural structure of your project. Extensive filter and search functions allow the required information to be displayed quickly in the Detail View.

Various information on sensors, devices or other elements can be displayed in the detail view. This allows the current status, alarms, warnings and other relevant data to be viewed. Depending on the configuration, further details such as temperature, humidity, access logs and much more can also be displayed.

The Detail View also offers the option of acknowledging alarms, adjusting settings and performing other actions to ensure the security and monitoring of the building or infrastructure.

Topology view

The topology view is used to display the logical or building structure of the location. The structures are represented by alarm groups that can be nested as required. The alarm behavior can in turn be configured separately for each alarm group or inherited in full or in part from the higher-level group.

System group

The settings of the system group serve as a template for the behavior of all alarm groups in the system and are the source of the inheritance of the settings for all other groups. The name of the group and therefore also the installation can be customized in the status bar.

Alarm groups

The alarm group structure represents the logical or structural structure of the Kentix system.

A structure can be divided into buildings, floors and rooms, for example. Each room is represented by its own alarm group. All alarm groups that represent the rooms on a floor are assigned to a higher-level alarm group (floor). This in turn is assigned to the higher-level alarm group that represents the building. Each device must be assigned to an alarm group. Devices are always assigned to alarm groups at the lowest level of the alarm group structure.

General

For a better overview in the topology view, the name of the alarm group should be chosen appropriately and clearly, as the name of the alarm group is used in every alarm message.

To make the devices less conspicuous when armed, stealth mode can be activated, which switches off the LEDs.

If an alarm group represents a particularly sensitive area, it is possible to extend the signaling range to the entire system. In the event of an alarm, the configured alarm is then triggered on all devices in the system.

Notification

If a warning or alarm occurs in an alarm group or its subordinate groups, the corresponding authorized users are notified via the configured channels.

To simplify the configuration of the alarm behavior of alarm groups, alarm settings and notification settings can be inherited by a subgroup.

For each alarm type (armed-active, permanently active, fire, sabotage, system message), you can specify whether notifications should also be sent when an alarm occurs. You can also decide whether the number of notifications of an alarm type should be limited per hour.

Arming

Arming an alarm group activates the evaluation of the armed alarms.

In the event that the secured area still needs to be left after arming, a delay can be configured so that arming only takes place after the set time.

The duration of the acoustic signaling during arming can be changed or completely deactivated if required.

Automatic acknowledgement

When an alarm is triggered, a user must respond and acknowledge the alarm. If an alarm is not acknowledged, it cannot be triggered again, so that any alarms of the same type (e.g. temperature alarm) that occur more than once are not reported. Automatic acknowledgement prevents this by acknowledging all acknowledgeable alarms of the devices in the alarm group at a set interval.

Alarm settings

If a device in the alarm group triggers an alarm, this is signaled acoustically via the buzzer.

If a secured area must be entered before the alarm group is disarmed, the pre-alarm can be activated. All devices in the alarm group that have a configured alarm delay of 5s or more now receive an acoustic signal that the alarm group must be disarmed.

For the various alarm types, you can configure how long an alarm should be signaled by the buzzer of the devices.

Sabotage report

To prevent device failures in the system, the behavior of the devices in an alarm group can be configured when a possible sabotage is detected.

The set times indicate how long a device may be inaccessible before a tamper alarm is triggered.

Webhooks

Alarm groups can trigger the sending of a webhook for certain events. This can be used, for example, to trigger actions on external servers and services.
The following events are supported:

  1. All alarms
  2. Set-active alarms
  3. Continuous active alarms
  4. Fire alarms
  5. Sabotage alarms
  6. Changing the switching status (arming or disarming)
  7. Cyclical (5 min, 10 min, 15 min, 30 min)

DoorLock

A DoorLock can be assigned to an alarm group. This DoorLock is displayed in the KentixONE-GO apps as quick access for the alarm group.

Event profiles

To automatically arm or disarm an alarm group, a previously created event profile can be assigned to it. This defines the times at which the alarm group is to be armed or disarmed.

Table view

The table view offers a structured and clear presentation of the data. It allows information to be displayed in tabular form, which can be particularly useful if a large number of data points are available and a detailed analysis is to be carried out. The data can be easily sorted, filtered and searched according to specific criteria. Various tables with the desired attributes can be configured for this purpose.

For a detailed analysis of the room temperature and dew point, for example, a new table can be created that contains all device types with integrated temperature sensor and the room temperature and dew point attributes as columns.

The sum of the configured tables can also be saved as a table profile.

Table profiles

KentixONE offers the option of configuring any number of table profiles. In addition, the attributes of a table can be sorted as required. This means that large volumes of data can be analyzed very quickly and in detail.

The predefined Standard table profile contains five tables that cover the areas of MultiSensor Monitoring, Power Monitoring, Network Monitoring, Access and Video. The standard table profile can neither be renamed nor configured.

Tile view

The tile view offers a visually appealing display of the devices and sensors. This view is particularly suitable for a quick overview of the status of the sensors and devices.

To obtain more information about a specific device, the tile can be expanded. This provides detailed information on this device in an expanded view.

Add device

As soon as a device is operated in Main Device mode, further devices and sensors can be added to the system. To do this, the devices to be added must be operated in Satellite Device mode.

Sensors and devices can be added to the Main Device system in each of the three views of the Detail View. As soon as the process for adding a device has been started, a window opens that guides you through the steps required to add the device.

For devices that are connected wirelessly, a host is required as a wireless remote station.

As soon as the device has been successfully added, a success message appears. A link to the configuration screen of the device also appears within the success message.

Mass editing

With this function, several devices can be edited simultaneously in the table view and in the tile view. To do this, the devices to be edited must be selected using the list icon in the top right-hand corner. The list of devices is influenced by the filters selected in the detailed view.

After selecting the devices, a list appears with possible values that can be edited. Only parameters that are supported by at least one of the selected devices are displayed.

To apply the changed values to all devices, it is essential to synchronize the system afterwards.

SuperSearch

The search bar (SuperSearch) displayed in the detail view can be used to filter the displayed elements in a variety of ways.

Clicking in the SuperSearch text field displays a list of possible search criteria, although not all criteria are available in every view of the Detail View.

After a search term has been entered, the SuperSearch filters the elements of the active view and updates the view. In addition, the items found are displayed as suggestions, allowing you to select a single device. Already selected filters influence the SuperSearch.

SuperSearch offers the following search criteria:

  1. Name / A device or alarm group with the entered name is searched for.
  2. Alarm group / Searches for all devices or alarm groups that are subordinate to the alarm group with the entered name.
  3. Alarm status / Searches for all devices or alarm groups with the entered alarm status.
  4. Open doors / Searches for all open DoorLocks or alarm groups with open DoorLocks.
  5. Device type / Searches for all devices of a specific type, e.g. DoorLock or MultiSensor.
  6. Measured value / Searches for all devices that provide the measured value.

Filter profiles

With the help of filter profiles, any combination of filters can be saved in the Detail View and quickly and easily called up again later.

Manage filter profiles

Once filters have been selected, the selection can be saved as a filter profile. Existing filter profiles can be subsequently edited by adding or removing filters or saved as a new filter profile.

If a new filter profile is created or an existing one is saved with changes as a copy, the settings for this filter profile can be defined in the dialog that opens.

If the filter profile is enabled for all users, this profile is displayed for all users in the selection of filter profiles. A profile released for all users can also be used by the administrator as a system-wide standard filter. This standard filter is then preselected for all users as soon as they open the Detail View.

Standard profile

Each user can set an existing filter profile as their personal default. The selected default profile takes precedence over the global default profile, which can be defined by the administrator.

Was this article helpful?

Related Articles