Difference between revisions of "Intrusion"
Line 8: | Line 8: | ||
|} | |} | ||
+ | <center> | ||
{| class="wikitable" | {| class="wikitable" | ||
|- style="background-color:#ffffff;" | |- style="background-color:#ffffff;" |
Latest revision as of 20:42, 3 November 2020
![]() |
Intrusion is used to detect areas can’t be casually entered, exited or crossed in the monitoring scenario, it will trigger device alarm if the target object touches the detection line. |
---|
Intrusion | ||
---|---|---|
Set Up | Configure Alarm Trigger |
Notifications |
Set Up Intrusion on your device using various interfaces. > How To Set Up Intrusion Alarm |
Configure responses when the Intrusion alarm is triggered, such as email notifications or alarm output. > Configure Alarm Response |
Receive notifications using the mobile app > Set Up Notifications |
Contents
[hide]Instructions
[Expand]
[Expand]
[Expand]
[Expand]
[Expand]
[Expand]