To help your security personnel quickly respond to a threatening situation, you can
define threat levels.
What you should know
CAUTION: The system does not automatically revert to the state it was in before
the threat level was set. You must explicitly define the actions that are triggered when the
threat is cleared.
To define a threat level:
-
Open the System task, click the General
settings view, and click the Threat levels tab.
-
At the bottom of the threat level list, click Add an item
().
-
In the Threat level configuration dialog box, enter the
Name, Description, Logical
ID (optional), and Color of the threat level.
TIP: Choose a distinctive color for each threat level, so that when the threat
level is set at the system level and the Security
Desk background turns that color, the
users can easily identify the threat.
-
Configure the threat level Activation actions.
These actions are executed by the system when the threat level is set, independently
of the privileges and permissions of the user who set the threat level.
-
Configure the threat level Deactivation actions.
These actions are executed by the system when the threat level is cleared or
overwritten by another one, independently of the privileges and permissions of the user
who cleared the threat level.
-
Click OK.
A new threat level (
) appears in
the threat level list.
-
Click Apply.
After you finish
For all users who need to set threat levels, make sure that they are part of the
public partition, and make sure that
they are assigned the Set threat level user privilege.
- To view which threat levels and security clearance are set on each area, use the
System status task.
- To find out when threat levels were set and cleared, and who did it, use the
Activity trails task.