Installing XProtect VMS in a multi-server environment
Larger XProtect VMS installations require installing various XProtect components on dedicated servers. In this course you will help install and configure a distributed, large XProtect VMS solution.
After completing this course, partners and integrators familiar with XProtect VMS will be able to:
- Identify Milestone Support resources.
- Prepare a system for XProtect.
- Find and download XProtect.
- Install XProtect VMS on dedicated servers.
Configuring Storage and Archiving for XProtect VMS
Milestone XProtect VMS offers flexible storage options enable you to choose the most cost-effective, secure, and reliable storage and archive solutions for your customers' business. This course covers the architecture and configuration of storage in XProtect.
Getting Started with Rules in XProtect VMS
The rules engine in XProtect VMS allows you to automate and tailor the surveillance system to match specific needs and conditions. By implementing rules, you can increase operational efficiency and automate standard security tasks at the same time. Furthermore, you can reduce the number of manual activities around the system. This course covers concepts and tasks to help you benefit from the rules engine in XProtect Express+, XProtect Professional+, XProtect Expert, and XProtect Corporate.
Moving Hardware Devices
The Move Hardware feature allows customers to load balance, replace hardware, and replace a defective recording server without interruption of the playback or exporting of video. This eLearning course covers the benefits of moving hardware and how to move hardware between different Recording Servers.
Configuring and Using XProtect Access
XProtect® Access is an add-on product to Milestone’s XProtect VMS and Husky NVRs that makes it possible to integrate access control into your software. This course covers how to configure and use the XProtect Access add-on.
Designing with multi-streaming
Multi-streaming and adaptive streaming improves performance and reduces client CPU load. This course covers how to design an adaptive streaming solution.
After completion, solution designers will be able to:
- Explain how multi-streaming improves system performance.
- Design multi-stream solutions for specific challengest.
Configuring and Using Edge Storage in XProtect VMS
Edge Storage refers to the ability of modern IP cameras to record video and audio to embedded or removable onboard media storage devices instead of, or in addition to, streaming media to a centralized recording server. Milestone XProtect VMS supports the retrieval of edge storage recordings and features several ways to maximize system reliability, flexibility, and performance when using edge storage to complement centralized recording.
Configuring and Using Enhanced PTZ
XProtect PTZ enhancements help end customers recognize, react to, and investigate incidents as a coordinated team more effectively than ever. This course describes how to set up, select, and use presets and patrolling profiles for a PTZ camera in the XProtect Smart Client. It also describes how to take and release control of a PTZ camera in a reserved session and adjust the timeout for manual and reserved PTZ sessions.
After completing this course, system integrators will be able to:
- Set up presets and patrolling profiles for a Pan-Tilt-Zoom (PTZ) camera in the Smart Client.
- Select and Use PTZ presets and patrolling profiles.
- Take and release control of a PTZ camera in a reserved session.
- Adjust the timeout for manual and reserved PTZ sessions.
Configuring and Using Maps
XProtect® Smart Client Maps help you find cameras by location, alert you to locations of problems or alarms, and provide an overall view of a site. This course covers how to configure and use Smart Client Maps.
Configuring and Using XProtect Smart Map
XProtect Smart Map is a new XProtect Smart Client feature that allows operators to view camera and other device locations on different types of geographic information system (GIS) world maps. This course covers the configuration and use of the XProtect Smart Map feature.
Configuring XProtect Mobile with Smart Connect
The Milestone Mobile Server can automatically identify network addresses and configuration of consumer-grade routers. This course covers how to connect to the Mobile Server from any location and demonstrates how to send an email directly from within the administration interface to the end-user.
Configuring and Using Push Notifications
Push notifications provide the occasional user, as well as patrolling officers, notifications about incidents that require their attention. This course covers how to enable push notifications on the Mobile Server.
Exploring XProtect VMS System Architecture
Milestone XProtect can be deployed in both single-server and distributed installations. In this course, you explore the system architecture of a XProtect Video Management Software (VMS) installation and discover the purpose of each system component.
After completing this course, system designers and integrators will be able to:
- List the components of XProtect VMS.
- Explain the function of each of the components.
- Describe the communication protocol and ports for various functions within the system.
Configuring and Using Alarms and Notifications
Alarms and notifications can be configured to alert personnel to internal system-related and external integrated events. This eLearning course covers how to configure and use Alarms and Notifications.
After completing this course, partners and integrators will be able to:
- Enable desktop notifications.
- Configure alarm data settings.
- Create an alarm definition.
- Associate a map with an alarm.
- Create a time profile to determine when an alarm is active.
- Specify which roles see which alarms.
- Assign an alarm to another team member.
- Open and close an alarm.
Configuring Milestone Interconnect™
Milestone Interconnect can connect multiple XProtect installations across the globe. This course covers how to configure Milestone Interconnect in XProtect Corporate.
Configuring the XProtect System Monitor
The XProtect Smart Client System Dashboard provides customers with real-time system status with a tile-based dashboard that allows them to respond proactively to problems. This eLearning course covers how to configure and use the System Monitor.
Troubleshooting and Securing XProtect VMS with Server Logs
The Server Logs node in the XProtect Management Client can help System Administrators track VMS activity, troubleshoot problems, and secure their systems. In this course, you use server logs to maintain system health.
After completing this course, system administrators will be able to:
- Adjust log settings and retention times to comply with organizational requirement.
- Identify server log components.
- Apply and clear log filters.
- Use System logs to view hardware, software, or communications activity.
- Use Audit logs to monitor configuration changes and operator activity.
- Use Rule-triggered logs to create customized log messages.
- Export log entries for documentation.
Hardening XProtect VMS
Hardening is a continuous process of identifying and understanding security risks and taking appropriate steps to counter them. In the Hardening XProtect VMS course, you apply different types of security measures in operating systems, networks, and XProtect VMS itself.
After completing this course, system integrators and designers will be able to:
- Describe common security problems with video surveillance installations.
- Explain how a holistic approach is needed to combat security risks.
- Determine critical considerations for choosing the appropriate security measures.
- Describe the process of implementing improved security.
Milestone Server Communication Encryption
Server encryption is an important security topic to discuss when planning and implementing a Milestone XProtect VMS. In this course, you explore encryption options for network communications.
After completing this course, system designers and integrators will be able to:
- Describe the basics of computer-to-computer encryption.
- Explain server communication encryption.
- Determine critical considerations for enabling communication encryption.
- Describe the process of applying server communication encryption.