Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 5 Next »

System Menu: Settings: System Settings

These are the settings for the software system, including plural user security.

On this page:

System Settings

  1. Database Configuration:
    1. Schedule Backup: controls the scheduled back ups of the database - weekly by default.
    2. Restore from Backup: accesses previous backups and displays them for potential restore.
  2. Track Settings:
    1. Track Check Period (ms):
    2. Maximum Sightings:
    3. Minimum Debris Sightings:
    4. Last Sightings:
    5. Debris Movement Limit (m):
    6. Use Radar NTP Time:
  3. System Alarm Options:
    1. Audible Alarm: select to have a sound emitted when a system alarm is active.
    2. Custom Threat Sound: the sound clip emitted for a threat alarm (this supports most common sound formats including mp3 and wav).
    3. Custom Warning Sound: the sound clip emitted for a warning alarm (this supports most common sound formats including mp3 and wav).
    4. Alarm Timeout (s): the length of time before the alarms are cleared after a system or AID alarm has been resolved.
    5. Auto Acknowledge: select if alarms are automatically acknowledged when they are cleared. If auto-acknowledge is disabled, then the operator is expected to acknowledge all alarm incidences. 
  4. Mongo Index Options:
    1. System Logs Retention Days: how long system logs are maintained in the database before being deleted. 
    2. Alarm Log Retention Days: how long alarm logs are maintained in the database before being deleted. 
  5. System Profiles:
    1. Current Profile Name: the current profile in use.
    2. Current Profile User ID: a user friendly Id that can be used for external control, associated with whomever created the profile. 
    3. Adding a New Profile: follow this link for more information on System Profiles.
  6. Password Complexity:
    1. Required from Roles: determines which roles will have a password that applies to this complexity.

      The Roles are a hierarchy: 

      1. Administrator
      2. Engineer
      3. User
      4. System

      A complex password will be required from not only the role selected, but all roles above it in the hierarchy too.

    2. Password Length: the minimum length of password required.
    3. Min. Character Types: the minimum number of different character types needed to be in the password. There are four character types: abc, ABC, 123, @&(. If no password is required, both Password Length and Min. Character type values should be entered as '0'.



Related information

  • No labels