User's Manual
Table Of Contents
- Foreword
- Important Safeguards and Warnings
- 1 Overview
- 2 Configuration Flow
- 3 Device Initialization
- 4 Basic Configuration- 4.1 Login
- 4.2 Live
- 4.3 PTZ Operation
- 4.4 Playback
- 4.5 Camera- 4.5.1 Conditions
- 4.5.2 Setting Video Parameters- 4.5.2.1 Video
- 4.5.2.2 Snapshot
- 4.5.2.3 Overlay- 4.5.2.3.1 Configuring Privacy Masking
- 4.5.2.3.2 Configuring Channel Title
- 4.5.2.3.3 Configuring Time Title
- 4.5.2.3.4 Configure Text Overlay
- 4.5.2.3.5 Configure Font Attribute
- 4.5.2.3.6 Configure Picture Overlay
- 4.5.2.3.7 Configure Custom Overlay
- 4.5.2.3.8 Configuring OSD Info
- 4.5.2.3.9 Configuring Counting
- 4.5.2.3.10 Configuring Structured Statistics
- 4.5.2.3.11 Configuring Ranging
- 4.5.2.3.12 Configuring ANPR
- 4.5.2.3.13 Configuring Face Statistics
 
- 4.5.2.4 ROI
- 4.5.2.5 Path
 
- 4.5.3 Audio
 
- 4.6 Network
- 4.7 Storage
- 4.8 System
 
- 5 Event- 5.1 Setting Alarm Linkage
- 5.2 Setting Smart Track
- 5.3 Setting Panoramic Calibration
- 5.4 Setting Video Detection
- 5.5 Setting Smart Motion Detection
- 5.6 Setting Audio Detection
- 5.7 Setting Smart Plan
- 5.8 Setting IVS
- 5.9 Setting Crowd Map
- 5.10 Setting Face Recognition
- 5.11 Setting Face Detection
- 5.12 Setting People Counting
- 5.13 Setting Heat Map
- 5.14 Setting Stereo Analysis
- 5.15 Setting ANPR
- 5.16 Setting Video Structuralization
- 5.17 Setting Relay-in
- 5.18 Setting Abnormality
 
- 6 Maintenance
- Appendix 1 Cybersecurity Recommendations
User’s Manual 
197 
 Cybersecurity Recommendations Appendix 1
Cybersecurity is more than just a buzzword: it’s something that pertains to every device that is 
connected to the internet. IP video surveillance is not immune to cyber risks, but taking basic 
steps toward protecting and strengthening networks and networked appliances will make them 
less susceptible to attacks. Below are some tips and recommendations  on how to create a 
more secured security system. 
Mandatory actions to be taken for basic equipment network security: 
1.  Use Strong Passwords 
Please refer to the following suggestions to set passwords: 
  The length should not be less than 8 characters; 
  Include at least two types of characters; character types include upper and lower case 
letters, numbers and symbols; 
  Do not contain the account name or the account name in reverse order; 
  Do not use continuous characters, such as 123, abc, etc.; 
  Do not use overlapped characters, such as 111, aaa, etc.; 
2.  Update Firmware and Client Software in Time 
  According to the standard procedure in Tech-industry, we recommend to keep your 
equipment (such as NVR, DVR, IP camera, etc.) firmware up-to-date to ensure the 
system is equipped with the latest security patches and fixes. When the equipment is 
connected  to  the  public  network,  it  is  recommended  to  enable  the  “auto-check for 
updates”  function  to  obtain  timely  information  of  firmware  updates  released  by  the 
manufacturer. 
  We suggest that you download and use the latest version of client software. 
"Nice to have" recommendations to improve your equipment network security: 
1.  Physical Protection 
We suggest that you perform physical protection to equipment, especially storage devices. 
For example, place the equipment in a special computer room and cabinet, and implement 
well-done  access  control  permission  and  key  management  to  prevent  unauthorized 
personnel from carrying out physical contacts such as damaging hardware, unauthorized 
connection of removable equipment (such as USB flash disk, serial port), etc. 
2.  Change Passwords Regularly 
We suggest that you change passwords regularly to reduce the risk of being guessed or 
cracked. 
3.  Set and Update Passwords Reset Information Timely   
The equipment supports password reset function. Please set up  related information for 
password  reset  in  time,  including  the  end  user’s  mailbox  and  password  protection 
questions. If the information changes, please modify it in  time. When setting password 
protection questions, it is suggested not to use those that can be easily guessed. 
4.  Enable Account Lock 
The account lock feature is enabled by default, and we recommend you to keep it on to 
guarantee the account security. If an attacker attempts to log in with the wrong password 
several times, the corresponding account and the source IP address will be locked. 










