CCTV Camera Pros Geovision 8.4 Multicam Digital Surveillance System User Manual
Page 177

Video
Analysis
161
3
6. To activate the function at certain times only, click the Schedule button and select Active
Schedule. For details, see Video Analysis Schedule later in this chapter.
7. Click
OK to apply the setting.
8. Enable monitoring to start intrusion detection.
When the intrusion event is detected, the configured computer alarm or output device will be activated,
and the event will be recorded as Intruder in System Log for later retrieval.
More options in the Alarm dialog box:
Show Alarm Region: Displays the drawn lines on the preview image.
Never Recycle: When the option is checked, the alarm-triggered events won’t be recycled even
when disk space is full.