User's Manual
Table Of Contents
- Foreword
- Important Safeguards and Warnings
- 1 Overview
- 2 Configuration Flow
- 3 Device Initialization
- 4 Login
- 5 Main Interface
- 6 Setting- 6.1 Local
- 6.2 Camera- 6.2.1 Setting Image Parameters
- 6.2.2 Setting Encode Parameters- 6.2.2.1 Encode
- 6.2.2.2 Overlay- 6.2.2.2.1 Configuring Privacy Masking
- 6.2.2.2.2 Configuring Channel Title
- 6.2.2.2.3 Configuring Time Title
- 6.2.2.2.4 Configuring Location
- 6.2.2.2.5 Configuring Font Properties
- 6.2.2.2.6 Configuring Picture Overlay
- 6.2.2.2.7 Configuring Custom Title
- 6.2.2.2.8 Configuring Target Statistics
- 6.2.2.2.9 Configuring Face Detection
- 6.2.2.2.10 Configuring Face Recognition
- 6.2.2.2.11 Configuring Face Statistics
 
- 6.2.2.3 ROI
 
- 6.2.3 Setting Audio Parameters
 
- 6.3 Network
- 6.4 Event
- 6.5 Storage
- 6.6 System
- 6.7 System Information
- 6.8 Setting Log
 
- 7 Live
- 8 AI
- 9 Camera
- 10 Event
- 11 System
- 12 Security
- 13 Record
- 14 Picture
- 15 Report
- Appendix 1 Cybersecurity Recommendations
Operation Manual 
115 
12 Security 
12.1 Security Status 
Background Information 
Detect the user and service, and scan the security modules to check the security status of the 
camera, so that when abnormality appears, you can process it timely. 
●  User and service detection: Detect login authentication, user status, and configuration 
security to check whether the current configuration conforms to recommendation. 
●  Security modules scanning: Scan the running status of security modules, such as 
audio/video transmission, trusted protection, securing warning and attack defense, not 
detect whether they are enabled. 
Procedure 
Step 1  Select 
Security
 > 
Security Status
. 
Step 2  Click 
Rescan
 to scan the security status of the camera. 
Figure 12-1 Security Status 
Related Operations 
After scanning, different results will be displayed with different color. Yellow indicates that the 
security modules are abnormal, and Green indicates that the security modules are normal. 
1.  Click 
Details
 to view the details of the scanning result. 
2.  Click 
Ignore
 to ignore the exception, and it will not be scanned in next scanning. 
Click 
Joint Detection
, and the exception will be scanned in next scanning. 
3.  Click 
Optimize
, and the corresponding interface is displayed, and you can edit the 
configuration to clear the exception. 










