Quick start guide
The main menu displays the available modules based on your product tier and user privileges. The sub-menu is contextual. It provides access to displays and tasks depending on the selected entity in the hierarchy tree panel. Relevant entities may be:
- Folders
- Edge devices (in physical view)
- Cameras
It notifies you of camera issues in your deployment that require your attention. Issues are color-coded by their severity:
- Red displays errors
- Orange display warnings
Click here to modify your profile, change language, or log out of IRIS+. Use this menu to collapse or expand the side panel and expand the screen to view critical information in detail.
The panel to the left is the Hierarchical tree view The tree view lets you organize cameras and devices in a flexible and powerful way. You can create as many folder levels as you want and structure your installation in the way that best suits your way of working. Many of our customers use one folder level to group "Sites" (physical locations), while others use them to group large regions or logical subsets. When working in the system, the item you select in the tree view will affect what is shown in the Main work area:
- Selecting the top node, the Account will show information relating to all cameras and devices.
- Selecting a folder will show information relating only to that folder and the cameras/devices under it.
- Selecting a single camera or device will show information relating only to that.
The tree view is broken up into two different tabs
A logical structure for your organization, as you see fit. For example - by site, by group, and by cameras. This view displays only cameras.
Defined by actual account implementation. This view displays primarily IRIS+ Edge devices and will show their connected cameras as children of that Edge device to give information about what device each camera is being processed.
The administration module lets you define the system configuration
- Setting up your account
- Connecting edge devices
- Connecting Cameras
- Defining Schedules
- Defining Rules for events
The Monitor module lets you view detected events based on defined rules.
It includes the following functions:
- Viewing detected Events
- Viewing the detected event Camera's Live Feed
- Tagging the detected event as True or False
The sub-menus provide display and access options for viewing detected events such as export, filters, timelines, and folders in the organizational structure. Use them to determine:
- the way you view the events
- which events to view
- how to access and view the events
The panel displays snapshots of the relevant events based on your selections in the tree and in the sub-menus. The events are displayed as monitor cards. A card shows the details of event as well as functionality to access more information and close the event as a True or False event.
The detected events can also be viewed in High-contrast mode for easier handling.
The Investigate module lets you search and find relevant events of interest and view their video clips based on your search criteria. You can search:
- on the map
- via specific cameras
The panel lets you search based on your criteria to find the most relevant results. You can use the following tools:
- Search on the map or via cameras
- Select relevant rules and parameters
- Use identifiable objects such as vehicle type and color
- Determine the relevant timeframe and period
The Report module lets you export the statistical reports as files and view them in a spreadsheet application such as Excel.
The Schedule Reports tab lets you create and edit a reporting schedule. Using scheduled reports you can automate receive a custom report in your mailbox without having to access the system.
Custom sceduled reports can be generated daily, weekly or monthly, and can be sent to one or more user defined e-mail addresses.
The Settings module allows you to view and define general system settings.
In this module you can perform some of the following based on your role and permissions:
- View audit logs of actions performed in the system.
- Add integration targets through which you'd like to receive detected events.
- Define device profiles for the Edge devices.
- Manage users in the system.
The sub-menu provides access options for system Settings such as Audit log, Integration targets, User management, and Device profiles.
For account admins, locate the Settings tab, access the Users section, and locate the +Add button.
When clicking on the +Add button, provide an email, role, and security group for the invitee. Note that only admins do not need a security group to complete an invite.
Once done, click the Send Invitation button to complete the invite. The invitee should receive the first account setup step through their email.
As the invitee, locate the email sent from Irisity, titled Login to IRIS+, open the email, then click the link provided.
The link should direct the invitee to the account recovery step. Follow the steps to complete the account creation.
The invitee should add their email in this step, then click submit. Once completed, they should receive an email containing a verification code, while being directed to the verification step in the web page.
Apply the code to the verification step. Once submitted, the portal will require a new password.
Once a password has been created and saved, the invitee will now have the option to enable two-factor authentication. This step is skippable if desired.
It is highly recommended to store the generated secret code in a password manager or vault of the user's choice.
To use the authenticator app code, scan the QR code with your mobile device. Select the authenticator app of choice, generate the app code, copy & paste app code into the portal's authenticator app, and click save.
Additionally, the invitee will have the option to reset or unlink their two-factor authentication setting in the portal, which is mentioned below.
Using two-factor authentication is recommended for improving account access and security.
To get started, log in to the portal and locate account settings. Click on the icon to expand the account settings menu and click on the option Configure Authenticator.
Once clicked, the authentication options and instructions will be shown.
It is highly recommended to store the generated secret code in a password manager or vault of the user's choice.
To use the authenticator app code, scan the QR code with your mobile device. Select the authenticator app of choice, generate the app code, copy & paste app code into the portal's authenticator app, and click save.
If the authentication code is successful, a success confirmation message will display.
To unlink the current authentication app, simply click on "Unlink TOTP Authentication App".
In order to ensure an easy login process for all users, all non-admin users must be assigned to at least one security group.
Whenever a security group is created, the permissions by default are blank.
In order for the security group to log in properly, the group must be given proper permissions. Click on edit to update permissions.
Once in edit mode, click on the + button to add permissions.
The admin should now be prompt to select the appropriate folders that should be made available to users within the security group. Click on a folder to select.
Once selected, the admin is able to adjust the types of permissions, delete all permissions, or save the permissions setup.
At this point, all users in the security should now to able to log in properly without accessing actions of restricted areas or folders in the portal.
Rules are defined per camera and the camera's field of view. You will be able to use drawing tools to mark the line or area relevant for the rule.
Rules can be defined for people, objects or vehicles. When creating a new rule, all relevant object types are offered. Events are generated:
- When there is a breach of the user-defined rules.
- By abnormal behavior detected by innoVi's anomaly feature.
In the context of security operations, anomalies refer to data points that deviate significantly from expected patterns or behavior. To help you effectively handle these anomalies, our software utilizes machine learning algorithms such as clustering, regression, and decision trees. These algorithms allow you to detect and isolate anomalies in your data, enabling you to either remove them from the dataset or account for them in your security models.
For every camera, one anomaly rule will be enabled. To edit, click the edit button to update the object type of choice, sensitivity of events, and /or update the training schedule.
For best results, define only relevant object type per camera
- Refrain from using the Vehicle object type on a camera that is indoor
For optimal performance, it is best to set Sensitivity to 3 events per week.
In the Integrations tab, users are allowed to setup and add targets.
Email Integration Set Up for Health Events
To setup a basic email integration, select +Add
To proceed with setting up this integration, the following fields must be filled out:
- Type – Select Health Alert
- Target – Set to Email Target
- Entity Type – Set to Device
- Status – Set to Error
- State – Set to Communication Error
- Subject – What you would like your email subject to be
- Recipients – Email addresses of recipients
Once completed, click Test to send a test email to the recipients, or click Save to finish the setup
To change the frequency of health alerts, locate a folder within the account under Physical View
Once the folder is selected, the page will display basic information including Health Alerts Thresholds.
To update Health Alerts frequency, click Edit to enable the threshold in Edit Mode
In Edit Mode, the Notify and Repeat Options can be adjusted by minutes and hours.
Note: The minimum threshold for Notify is 5 minutes and the threshold for Repeat is 3 hours.
Click Save to save the settings and exit the Edit Mode.
Use the innoVi support form here: https://support.agentvi.com/support/innovi-request/ Email: [email protected]