User's Manual
Table Of Contents
- Product Key Features
- Chapter 1 Introduction- 1.1 Front Panel
- 1.2 IR Remote Control Operations
- 1.3 USB Mouse Operation
- 1.4 Rear Panel- 1.4.1 DS-7100HQHI-K1, DS-7200HUHI-K (/P), iDS-7200HUHI-K/4S, DS-7200HTHI-K, DS-7200HQHI-K(/P), and iDS-7200HQHI-K/S
- 1.4.2 iDS-7200HQHI-K/S(B) and iDS-7200HQHI-M/S
- 1.4.3 DS-7100HUHI-K1
- 1.4.4 iDS-7200HUHI-K/4S(B) and iDS-7200HUHI-M2/S
- 1.4.5 DS-7200HQHI-K1/E and DS-7200HUHI-K1/E
- 1.4.6 DS-7300HQHI-K
- 1.4.7 DS-7300HUHI/HTHI-K4, iDS-7316HUHI-K4/16S and DS-9000HUHI-K8
- 1.4.8 DS-7300HQHI/HUHI-K4, DS-8100HQHI/HUHI-K8, DS-9000HUHI-K8, and iDS-9016HUHI-K8/16S
- 1.4.9 DS-7200HGHI-K1
- 1.4.10 DS-7200HGHI-K2
- 1.4.11 DS-8100HTHI-K8
- 1.4.12 DS-9000HTHI-K8
 
 
- Chapter 2 Getting Started
- Chapter 3 Camera Management
- Chapter 4 Camera Settings
- Chapter 5 Live View
- Chapter 6 PTZ Control
- Chapter 7 Storage- 7.1 Storage Device Management
- 7.2 Storage Mode
- 7.3 Recording Parameters
- 7.4 Configure Recording Schedule
- 7.5 Configure Continuous Recording
- 7.6 Configure Motion Detection Triggered Recording
- 7.7 Configure Event Triggered Recording
- 7.8 Configure Alarm Triggered Recording
- 7.9 Configure Picture Capture
- 7.10 Configure Holiday Recording and Capture
- 7.11 Configure Redundant Recording and Capture
- 7.12 Configure 1080p Lite
 
- Chapter 8 Disk Array
- Chapter 9 File Management
- Chapter 10 Playback
- Chapter 11 Event and Alarm Settings
- Chapter 12 POS Configuration
- Chapter 13 VCA Event Alarm- 13.1 Human Body Detection
- 13.2 Face Detection
- 13.3 Vehicle Detection
- 13.4 Line Crossing Detection
- 13.5 Intrusion Detection
- 13.6 Region Entrance Detection
- 13.7 Region Exiting Detection
- 13.8 Unattended Baggage Detection
- 13.9 Object Removal Detection
- 13.10 Audio Exception Detection
- 13.11 Sudden Scene Change Detection
- 13.12 Defocus Detection
- 13.13 PIR Alarm
 
- Chapter 14 Smart Analysis
- Chapter 15 Human Body Detection
- Chapter 16 Network Settings
- Chapter 17 System Maintenance
- Chapter 18 General System Settings
- Chapter 19 Appendix
Network Video Recorder User Manual   
205 
Strong Password recommended–We highly recommend you create a strong password of your own 
choosing (Using a minimum  of 8 characters,  including at least  three of  the following  categories: 
upper case  letters, lower case letters, numbers, and special characters.) in  order to increase the 
security of your product. And we recommend you reset your password regularly, especially in the 
high security system, resetting the password monthly or weekly can better protect your product. 
 User Level: Set the user level to Operator or Guest. Different user levels have different 
operating permission. 
Operator: The Operator user level has permission of Two-way Audio in Remote 
Configuration and all operating permission in Camera Configuration by default.   
Guest: The Guest user has no permission of Two-way Audio in Remote Configuration and 
only has the local/remote playback in the Camera Configuration by default. 
 User’s MAC Address: The MAC address of the remote PC which logs onto the device. If it is 
configured and enabled, it only allows the remote user with this MAC address to access the 
device. 
 Click OK to finish the new user account adding.   
Result: In the User Management interface, the added new user is displayed on the list. 
 User List 
Set Permission for a User 
Purpose: 
For the added user, you can assign the different permissions, including the local and remote 
operation for the device. 
 Go to System > User. 
 Select a user from the list and then click the    button to enter the permission 
settings interface.   










