User's Manual
Table Of Contents
- Foreword
- Important Safeguards and Warnings
- 1 Overview
- 2 Configuration Flow
- 3 Device Initialization
- 4 Login
- 5 Main Interface
- 6 Setting- 6.1 Local
- 6.2 Camera- 6.2.1 Setting Image Parameters
- 6.2.2 Setting Encode Parameters- 6.2.2.1 Encode
- 6.2.2.2 Overlay- 6.2.2.2.1 Configuring Privacy Masking
- 6.2.2.2.2 Configuring Channel Title
- 6.2.2.2.3 Configuring Time Title
- 6.2.2.2.4 Configuring Location
- 6.2.2.2.5 Configuring Font Properties
- 6.2.2.2.6 Configuring Picture Overlay
- 6.2.2.2.7 Configuring Custom Title
- 6.2.2.2.8 Configuring Target Statistics
- 6.2.2.2.9 Configuring Face Detection
- 6.2.2.2.10 Configuring Face Recognition
- 6.2.2.2.11 Configuring Face Statistics
 
- 6.2.2.3 ROI
 
- 6.2.3 Setting Audio Parameters
 
- 6.3 Network
- 6.4 Event
- 6.5 Storage
- 6.6 System
- 6.7 System Information
- 6.8 Setting Log
 
- 7 Live
- 8 AI
- 9 Camera
- 10 Event
- 11 System
- 12 Security
- 13 Record
- 14 Picture
- 15 Report
- Appendix 1 Cybersecurity Recommendations
Operation Manual 
76 
6.7.2 Online User 
Select    > 
System Info
 > 
Online User
 to view all the current users logging in to web. 
6.8 Setting Log 
6.8.1 Log 
You can view and back up logs. 
Step 1  Select    > 
Log
 > 
Log
. 
Step 2  Configure 
Start Time
 and 
End Time
, and then select the log type. 
The start time should be later than January 1st, 2000, and the end time should be 
earlier than December 31, 2037. 
The log type includes All, System, Setting, Data, Event, Record, Account, and Safety. 
● 
System
: Includes program start, abnormal close, close, program reboot, device 
closedown, device reboot, system reboot, and system upgrade. 
● 
Setting
: Includes saving configuration and deleting configuration file. 
● 
Data
: Includes configuring disk type, clearing data, hot swap, FTP state, and 
record mode. 
● 
Event
 (records events such as video detection, smart plan, alarm and abnormality): 
includes event start and event end. 
● 
Record
: Includes file access, file access error, and file search. 
● 
Account
: Includes login, logout, adding user, deleting user, editing user, adding 
group, deleting group, and editing group. 
● 
Security
: Includes password resetting and IP filter. 
Step 3  Click 
Search
. 
●  Click    or click a certain log, and then you can view the detailed information in 
Details
 area. 
●  Click 
Backup
, and then you can back up all found logs to local PC. 










