3
CONTENTS
Data protection notice .............................................................. 2
1. About this guide ................................................................ 4
1.1 Explanation of symbols .................................................... 4
1.2 Warranty ....................................................................... 4
1.3 Handling log-in details for your Secoris System ...................... 5
1.4 Important Safety Information ............................................ 6
1.5 Declaration of conformity ................................................. 6
2. About Secoris alarm systems .................................................. 7
3. Operational features ........................................................... 8
3.1 Comprehensive set/unset exibility ..................................... 8
3.2 Alarm communication ...................................................... 8
3.3 User options ................................................................... 8
3.4 Users and user types ........................................................ 8
3.5 HUA / panic alarms ........................................................... 9
3.6 Full logging .................................................................... 9
3.7 Test options ................................................................... 9
3.8 Installer remote access ..................................................... 9
3.9 Jamming and tamper monitoring ........................................ 9
4. Using the system ............................................................... 10
4.1 Keypad keys .................................................................. 10
4.2 About the standby screen ................................................. 11
4.3 Setting the system .......................................................... 11
4.4 Unsetting the system ...................................................... 12
4.5 Managing alarms ............................................................ 12
4.6 Managing alerts ............................................................. 13
4.7 Accessing the User menu .................................................. 13
4.8 Managing users ............................................................. 14
4.9 Omitting zones .............................................................. 18
4.10 Using shunt groups ......................................................... 19
4.11 Viewing the Log ............................................................. 20
4.12 Testing the system .......................................................... 21
4.13 System conguration ...................................................... 25
5. Terms and definitions ......................................................... 36
6. Declarations of compliance ................................................... 38
Appendix A – User Types .......................................................... 39
Appendix B – User Menu Map .................................................... 41
Appendix C – Entering Text ....................................................... 43
7. Notes .............................................................................. 44