DSX Access System, Inc. WinDSX User manual

®
WinDSX User’s Guide

b
This page was intentionally left blank.

c
DSX, Our Commitment to Service
Our Commitment to service is continually demonstrated through our Training Programs and Technical Support
Department. DSX stands behind its products and customers and constantly strives for excellence.
Our technical staff consists of engineers with field installation and service experience that are always ready to
answer any question. By providing a staff with years of security experience, DSX is able to offer valuable
insight into the complex issues that face the security contractor installing DSX equipment. DSX commitment to
service is unmatched in the security industry.
Information contained in this document was known to be true at the time of printing. This information is subject
to change at any time without notice. This document is a Team effort by the Technical Support Group at DSX.
Intent of this User Guide is to assist the actual user of the system in their daily operations. This Guide is a
supplement to the extensive Help system integrated into the software. Help is available by pressing F1.
DSX is a registered trademark of DSX Access Systems Inc; WinDSX is a trademark of DSX Access Systems
Inc.
The use of or reference to the term's Eltron, Fargo, Nisca, Pentium, Penware, Windows and Windows NT may
or may not be the registered trademarks of the respective companies.
Compliance
You must consult your local fire codes before installing any locking device on doors, gates, or barriers. A
construction and fire approval permit may be required before installing any equipment. Call your local Fire
Marshall for building code requirements in your area.
For UL installations, you must install the DSX System according to the UL Installation Manual and in
accordance with the National Electric Code, ANSI / NFPA 70 regulations and recommendations for US
Installations. Canadian installations must be in accordance with the Canadian Electric Code C22.1.
The DSX-1022, DSX-1040CDM, DSX-1040PDM, DSX-1042, DSX-1043, DSX-1044, DSX-CKI-C, DSX-
CKI-K, DSX-DP485 and DSX-FRB8 have been tested and found to conform to the requirements of UL 294.
The DSX-1022, DSX-1040CDM, DSX-1040PDM, DSX-1042, DSX-1043, DSX-1044, DSX-1040-PE-B, DSX-
MCI, DSX-LAN, DSX-SPS and DSX-2PC have been tested and found to conform to the requirements of UL
1076.
Camera and DVR integration was not tested by UL.
DSX Access Systems, Inc.
10731 Rockwall Road
Dallas, Texas 75238
888-419-8353 Sales, Shipping and Accounting
800-346-5288 Technical Support
214-553-6147 FAX
www.dsxinc.com

d

d
Table of Contents
DataBase / Setup
WinDSX Startup
DataBase / Location
Startup...................................................................................................... 1
DataBase Login........................................................................................ 2
Workstation Login ................................................................................. 85
ToolBar & Menus .................................................................................... 3
Menus Map .............................................................................................. 4
Operator Comments ................................................................................. 5
Operator Passwords.................................................................................. 6
Password Profiles..................................................................................... 7
Profiles – Locations.................................................................................. 8
Profiles – Menus ...................................................................................... 9
Profiles – Input/Output/Device Overrides............................................... 11
Profiles – Companies.............................................................................. 12
Profiles – Card Fields ............................................................................. 13
Profiles – Access Level .......................................................................... 14
Reports / System Programming .............................................................. 15
Reports / Card Holder............................................................................. 17
DataBase Backup ................................................................................... 23
History Backup ...................................................................................... 25
Restore/Repair Data ............................................................................... 28
Event Filters........................................................................................... 31
Card Holder............................................................................................ 34
Card Holder Search ................................................................................ 35
Card Holder List..................................................................................... 38
Adding a Card ........................................................................................ 39
Card Holder Phone # .............................................................................. 45
Card Holder Keys................................................................................... 46
Card Holder Skills.................................................................................. 47
Capture Card Holder Image.................................................................... 48
Import Card Holder Image...................................................................... 49
Edit Card Holder Image.......................................................................... 50
Print Card Holder Badge ........................................................................ 51
Activate/De-activate Company ............................................................... 52
Access Level .......................................................................................... 53
Bulk Load Access Levels ....................................................................... 56
Time Zones ............................................................................................ 60
Company................................................................................................ 63

f
Workstation
DataBase / Location
Holiday.................................................................................................. 64
User Defined Fields ............................................................................... 65
Guard Tour ............................................................................................ 68
Maps………………………………………………………… ................. 71
Override Group...................................................................................... 72
Badge Image Source .............................................................................. 73
Badge Image Type ................................................................................. 74
Badge Templates ................................................................................... 75
Keys ...................................................................................................... 80
History................................................................................................... 81
Email Groups – Alarm Email Notification ............................................. 89
Workstation Login ................................................................................. 91
Workstation Overview ........................................................................... 92
Workstation Overview continued ........................................................... 93
Card Holder Search................................................................................ 94
In / Out Status........................................................................................ 95
Location Operations............................................................................... 96
Devices (readers, keypads)..................................................................... 97
Inputs (alarm points) .............................................................................. 98
Outputs (locks, gates)............................................................................. 99
Override Groups / Comments............................................................... 100
Cameras............................................................................................... 101
Maps / Alarms .................................................................................... 102
Alarms / Customize ............................................................................. 103
DVR Operations .................................................................................. 104
Message Definitions............................................................................. 106

g
This page was intentionally left blank.


Startup
1
DataBase
Page 2
The Database program is the very core of the system. It is where the system is defined and
configured. Database manages all of the system data and provides the user with an easy but
dynamic graphical user interface. The database program not only houses the data entry
mechanism but also contains all system management utilities including Photo ID Badging.
Workstation
Page 92
The Workstation program is the actual user interface for all communications and controller
interaction in the system. There are four interactive windows within the workstation program.
These four windows are all sizeable with scroll bars to allow customizing of the desktop for
ease of use. The four Windows are Alarm, Event, Selection, and Control.
Comm Server
Comm Server is started and closed
by the Workstation program
The Comm Server program is a multi-tasking, communication application that runs as a
Process or Service and is located on the PC that has the physical and/or virtual connection to
the DSX Controllers. The Comm Server has no user interface, it simply communicates with
the DSX Controllers, downloading new data, uploading panel history, and logging all
transactions to the hard disk. The Workstation program interrogates the Comm Server
program through the network using the Comm Servers TCP/IP address. The Comm Server
Program responds to the Workstation requests and routes all alarm, input/output control and
system events to the Workstation Program.
Press F1 for Help Help can be received by pressing the F1 key from any Menu and
Data-Entry Screen in the DataBase program and from any location in the Workstation Program.

DataBase
Login
2
Double Click on the
DataBase ICON to
start the program.
The Login Screen below is displayed when the program
is started. Enter your User Name and Password. The
Default User Name is master, the default Password is
master both entered in all lower case.

DataBase
ToolBar & Menus
3
File
–
Select File to access the following:
Change Operator Password – Used to change password.
Enable Multiple Selections – For multiple card holder selections to be used
with the Activate/De-activate buttons and Bulk Modify Access Levels.
Bulk Modify Access Levels – Used to make group access level changes.
Exit – Exits the Program.
Double Click on System
to
expand the menu to display
Passwords, Reports, and Setup.
Double Click on Locations
to
expand the menu to display all
locations defined in the system.
Copy
– Click here after selecting a
data record that you wish to copy.
Delete
– Click here after selecting a
data record you wish to delete.
The
User Name
of the Operator
Logged onto the System is
displayed here.
Menu Window
List Window
Operator Log Off
– Click
here to Log Off and Return
to the Login Screen.
System Date and Time
Add
–
Click here
to add new
record.
Who Is In Report
– Click here to
receive a detailed report as to who
is in the facility and where they
last used their card. Card Holders
are listed by IN reader. Each list
shows a total number IN location
wide and a subtotal of those IN at
that reader.
The Who is In Report can be
configured to run from an Input
Alarm. For more Information
press “F1” for Help.

DataBase
Menus Map
4
Double Click on: System,
Reports, Setup, and
Locations to expand their
menus.
DataBase and
History Backup
Utilities, Page 23
Card Holder
Management,
Page 34
Location History
Report Generator,
Page 81
Click on the Menu Item,
then click on the Add
button in the Toolbar at
the top.
Add button
Access Level – Page 53
Time Zone – Page 60
Company – Page 63
Holiday – Page 64
UDFs – Page 65
Guard Tour – Page 68
Badge Temp – Page 75
Keys / Skills – Page 80
Operator Passwords
and Configuration,
Page 6

DataBase
Operator Comments
5
Operator Comments
are notes or text that can be recorded by the operator at any time. These
comments can be made and stored in history for future retrieval. The comments can be in response to
an alarm or restoral or any other incident. Predefined statements or comments can be described here
and later used by the operator. Free format comments can also be used instead of or in conjunction
with the predefined comments. Predefined Operator Comments can be used for consistent recording
of a common or recurring situation.
Click on
Operator Comment
in the
Menu then on Add.
Double Click here to
Edit
an
existing Operator Comment.
1.
Enter the
Name
of the Comment as it will be referred to and selected by.
2. Enter the Comment to be displayed and recorded.
3. Enter the Display Order, which determines its order in the comment pick list.

DataBase
Operator Password
6
Double Click here to Edit an Operator.
Operator Passwords
is the mechanism that secures the system from unauthorized use. The
Operator Passwords are unique to each operator providing the operators the same use of the
system regardless of which workstation they are at. Each operator has a Password Profile that
determines what privileges the operator has in the software. Each operator can have their own
Password Profile or multiple operators can share a profile. The Operator must enter their
Password when starting the system and must log off when leaving the workstation.
This method of password protection allows the manager to add the operator into the system and
assign them the appropriate password profile, and an initial password. The operator is given their
login name and password profile at which time they can change their password to one they only
know. Once this is done the manager can go back and modify the login name and profile without
viewing or changing the password.
1.
Enter the
Operator Name
.
2. Enter up a minimum of 6 and up to 10
alphanumeric characters for a Password. The
user name and password must be entered in all
upper case letters for them to be case sensitive.
3. Enter the same password again in the Confirm
Password field.
4. Select a Password Profile from the drop down
selection box.
5. Enter Notes about this Operator if applicable.
Note /// When using AD Authentication, Enter the
Operator Name and select the PassWord Profile
without clicking on the password fields.
Click on
Operator Password
in
the Menu and then on Add.

DataBase
Password Profiles
7
Click on the checkbox
to the
left of each description to
view the breakdown of, and
restrict privileges in, each
category.
View the following pages
for a breakdown of all 6
categories.
Select Visitors only if this
profile should only allow the
operator to manage visitors.
New
Password Profiles
have rights to nothing by default, indicated by no checkmarks in
the column of selection boxes below. By clicking in the box you place a checkmark and
provide full rights to that selection. By clicking on the checkmark you take it away which
takes you to the selection menus and break down for that listing.
Password Profiles
are the describing elements of where a password is valid and what it
is valid for. Custom profiles can be created for each Operator or can be shared by more
then one Operator.
Click on
Password Profile
in the
Menu and then on
Add.
Edit
a Profile
-
Double Click on the selected
Profile

DataBase
Profiles – All Locations
8
Use the
Location List
below to determine which locations this password
profile will be valid for. Select the Locations this Password should work at.
Select a Location and press the Space Bar or Double Right Click to
include or exclude a location.
Click on one of the
selections to the left to view
All Locations or to only
view the Locations selected
for this profile.
Click on the
Select All
checkbox to automatically
select all locations.
Click on the Clear All
Selections button to
deselect all locations.

DataBase
Profiles – All Menus
9
All Menus
is where menu items and functions, for which this Password
Profile will be valid, are selected. Items selected here are accessible to a
password with this profile. This answers the question of what functions this
Password is allowed to perform. Select the items from the list corresponding
to what this profile should be valid for and have access to.
Double Click on:
File, Edit
and System to expand their
menus.
Select a Menu Item then
Click on View, Add, Edit, and/or
Delete to provide the respective privileges for the menu
selection.
Double Right Click on the Menu Item to provide full rights.
Click on one of these to
Select All or Clear All
Selections.
Double Click on
Reports
to
expand the menu to display all
of the system reports available.
Select all reports this profile
should have access to.

DataBase
Profiles – All Menus
10
Under
Set Card Status
– selecting
Add
allows
the operator to Activate Cards, and selecting
Delete allows the operator to Deactivate Cards.
These two functions can now be separately
controlled.
Select the
Menu Items
and
assign the
View, Add, Edit,
and/or Delete privileges by
checking the appropriate
box to the right and then
Click OK at the bottom.
Double Right Click on the
Menu Item to provide full
rights.
Double Click to expand the
Locations Menu. Select
the appropriate Locations
followed by Workstation,
DataBase, and Cardholder
Menus and set the level of
access for each item.

DataBase
I/O, Device, & Camera Control
11
Input, Output, and Device
(card readers and/or keypads)
Overrides and
Camera Control are assigned to a profile here. Select the devices, inputs,
outputs, and cameras an operator with this profile will be allowed to
manipulate and have manual control over. Select the point then select one or
all of the override commands in the lower right corner. These overrides also
apply to Scheduled Overrides.
Double Click on the Location
to expand the menu and display all devices.
Double Click on each Device to expand the menu to display all of the inputs
and outputs associated with that device.
Double Click on Cameras to expand the menu to display all of the cameras.
Click on one of these to
Select All or Clear All
Selections.
Select the
Device, Input, Output and/or
Camera
above and then
click on the Override(s) appropriate for the point and the profile.
Devices – Disable / Time Zone
Inputs – Arm / Bypass / Time Zone
Outputs – Secure / Open / Time Zone / Grant Access
Cameras
–
Live / Recorded
A right double click on the title item will
select/de-select all items below it.

DataBase
All Companies
12
Companies
are the different organizations, businesses, departments, or other
groups of card holders. By Selecting a Company here, the operator with this
profile will only have access to the card holder data for that company as well
as the history that pertains to that company.
Double click on the Location or Location Group
below to expand the
menu to display all of the Companies defined for the location or locations.
Click on one of these to
Select All or Clear All
Selections.
Select the company you wish to give this operator access to and
then click here on Show Card Holders. This gives the operator
access to all company data such as the card holders assigned to the
company and their associated history.
Table of contents
Popular Software manuals by other brands

Novell
Novell IDENTITY AUDIT 1.0 - GUIDE manual

Nortel
Nortel Contact Recording user guide

Computer Associates
Computer Associates BABWBN2900NE5 - BRIGHTSTOR ARC BACKUP V9 DIS manual

Adobe
Adobe CONNECT ENTERPRISE SERVER 6-INSTALLATION... Installation

Canon
Canon VIXIA HR10 instruction manual

Cisco
Cisco TELEPRESENCE MANAGEMENT SUITE SECURE SERVER - CONFIGURATION GUIDE... Configuration guide

Novell
Novell IDENTITY MANAGER ENTITLEMENTS SERVICE DRIVER 3.6.1 -... Implementation guide

Dell
Dell PowerConnect W-Airwave Configuration guide

LG
LG LDK SYSTEM Installation and user guide

Xerox
Xerox SMARTsend 3.0 brochure

AVG
AVG IDENTITY PROTECTION - REV 90.5 user manual

Seagate
Seagate FreeAgent Theater user guide