User manual
Table Of Contents
- Chapter 1 System Requirement
- Chapter 2 Network Connection
- Chapter 3 Access to the Network Camera
- Chapter 4 Wi-Fi Settings
- Chapter 5 Live View
- Chapter 6 Network Camera Configuration
- 6.1 Configuring Local Parameters
- 6.2 Configuring Time Settings
- 6.3 Configuring Network Settings
- 6.4 Configuring Video and Audio Settings
- 6.5 Configuring Image Parameters
- 6.6 Configuring and Handling Alarms
- 6.6.1 Configuring Motion Detection
- 6.6.2 Configuring Tamper-proof Alarm
- 6.6.3 Configuring External Alarm Input
- 6.6.4 Configuring Alarm Output
- 6.6.5 Handling Exception
- 6.6.6 Email Sending Triggered by Alarm
- 6.6.7 Configuring Snapshot Settings
- 6.6.8 Face Detection
- 6.6.9 Configuring Other Alarms
- 6.6.10 Arming or Disarming the Camera
- Chapter 7 Storage Settings
- Chapter 8 Playback
- Chapter 9 Log Searching
- Chapter 10 Others
- Appendix

User Manual of Network Camera
58
You can configure the camera to trigger the alarm when the lens is covered and take
alarm response action.
Steps:
1. Enter the Tamper-proof Settings interface:
Configuration > Advanced Configuration > Events > Tamper-proof
Figure 6-28 Tamper-proof Alarm
2. Check Enable Tamper-proof checkbox to enable the tamper-proof detection.
3. Set the tamper-proof area; refer to Step 1 Set the Motion Detection Area in
Section 6.6.1.
4. Click to edit the arming schedule for tamper-proof. The arming
schedule configuration is the same as the setting of the arming schedule for motion
detection. Refer to Step 2 Set the Arming Schedule for Motion Detection in Section
6.6.1.
5. Check the checkbox to select the linkage method taken for the tamper-proof.
Audible warning, notify surveillance center, send email and trigger alarm output are
selectable. Please refer to Step 3 Set the Alarm Actions for Motion Detection in
Section 6.6.1.
6. Click to save the settings.