Bosch Building Technologies

    cancel
    Showing results for 
    Search instead for 
    Did you mean: 

    Security: Video

    Sort by:
    ‎08-19-2020 07:59 AM
    The attached document describes the installation package for BVMS. Operating system support of the specific BVMS version is listed in the BVMS release notes.  
    View full article
    ‎10-11-2019 12:02 PM
    This article provides you with information related to the Windows Firewall, how to access, configure and adjust it.   Firewall A firewall is a program installed on your machine or a piece of hardware in your network, that uses a rule-set to block or allow access to a computer, server or network. It seperatres dedicated network segments, likly your LAN from the Internet. Firewalls can permit traffic to be routed through a specific port to a program or destination, while blocking all other traffic.   Windows Firewall The Windows Firewall interface can be accessed multiple ways. The  way we will look during this TB is via the Windows search function. Click the Windows icon and type in “firewall“.  Then, click on the “Windows  Firewall with Advanced Security” icon.   The GUI provides you a general overview, about the basic function of the software. Displaying the current status of the firewall also which profiles are currently set up. By default the firewall should be enabled. We strongly recommend that the Windows Firewall is enabled on all your Bosch devices featuring a Windows Operating System.   Firewall profiles There are 3 different profiles within your Windows Firewall, which are simply groups of different firewall rule-sets, depending where your machine is currently connected. Public Profile: This profile is used when the computer is connected directly to a public network like a restaurant, library or airport. This profile should be the most restrictive because security is usually not well controlled in public places. Private Profile: This profile is used if your are only connected to  a private network, not directly to the Internet. In these cases, your device is located behind a router or hardware firewall. Which allows to set this profil less restrictive. Domain Profile: This profile is used when the machine is connected to a domain controller, which in turn is controlling a windows domain. This profile should be the least restrictive of the other  profiles because security is usually very well controlled within a domain.   Standdard rule-set by default the Windows Firewall behavior is the following:  Windows Firewall never blocks outgoing traffic. Any requests sent out from the server will not be hindered in any way. Windows Firewall blocks all incoming traffic, except for traffic that is in responses to a request. This means that if you make a request to Google, Google’s inbound reply to your outbound request will not be blocked. Windows Firewall blocks all other traffic. This means that any traffic that is not explicitly allowed is blocked in the firewall. In the Windows Firewall we can filter connection in two different kinds: port exceptions (rule assigned to a dedicated port number)  and program exception (rule assigned to a dedicated program)   In general we need to distinguish between the inbound (frome somewhere to your machine) and outbound (from your machine to somewhere) rule-set.   Open a port in the firewall (inbound rule) In the Windows Firewall with Advanced Security window, right-click "Inbound Rules", and then click "New Rule..." in the action pane. "Rule Type" dialog box, select "Port" depending on your need and then click "Next". In the "Protocol and Ports" dialog box, select "TCP". Then select "Specific local Ports", and then type the port number and then click "Next". In the "Action" dialog box, select "Allow the connection" and then click "Next". In the "Profile" dialog box, select any profiles that apply and then click "Next". (We have allowed all three for demonstration purposes, your selection may vary.) In the "Name" dialog box, type a name and description for this rule, and then click "Finish". At this point, you will now see a new rule in the main firewall rules in the center section, as well as a new listing in the right window panel.   Open a program in the firewall (inbound rule) Click on the "Inbound Rules" option on the top left of the firewall interface. Then, click on the "New rule…" Under "Rule Type" dialog box, select the option "Program" and then click "Next". Select the option "This Program path" browse to the path/location of the program  and click "Next". Next, we select the option “Allow the connection” and then click “Next”. Select the "Profile" the rule will be applied to and click "Next". (We have allowed all three for demonstration purposes, your selection may vary.) Select a "Name" and "Description" for this rule and then Click “Finish”. At this point, you will be dropped back to the main firewall screen. You will now see a new rule in the main firewall rules in the center section, as well as a new listing in the right window pane   Edit a port / program in the firewall Right-click on the rule which will open a context menu. Then click  "Properties" and adjust the rule according your needs .   Close a port / program in the firewall Right-click on the rule which will open a context menu. Then click  " Delete".       Adjust program rule after BVMS upgrade In case you upgraded your current BVMS up to BVMS10, refering to the article TSG-Upgrading-VRM-from-32bit-to-64bit you need to adjust the inbound + outbound rule "Bosch VRM Server" and  "USB Transcoder". Therefore right-click on the rule which will open a context menu. Then click "Properties" and adjust the programs path to: Bosch VRM Server: "C:\Program Files\Bosch\Video Recording Manager\VRM Server\bin\rms.exe" USB Transcoder: "C:\Program Files (x86)\Bosch\Video Recording Manager\VRM Server\bin\usbsvc.exe" Keep in mind, that you need to perform this action on all four rules (inbound and outbound) Alternatively download the attachment set_fw_rules.zip (1 KB) locally to your device, extract the archive and run the PowerShell script "set_fw_rule_trancoder.ps1" as administrator. The script will adjust all necessary rules.
    View full article
    ‎08-26-2020 01:48 PM
    When working with previous versions of BVMS, remote connectivity was cumbersome due to the amount of port mapping that needed to be configured. BVMS 7.5 provides a new method of remote connectivity utilizing Secure Shell (SSH) Tunnelling. The attached document (attachments can be found on the bottom of the page) describes the set-up and configuration of the SSH functionality in BVMS. In BVMS 10.1 we have added the capability for a management server (or DIVAR IP) to act as a bridge between a corporate network and a video network. We have described the configuration of this scenario in the BVMS 10.1 - Unteaming network interface cards document.
    View full article
    ‎08-02-2019 03:47 PM
     Time is everything: meetings, public transportation, religion, transactions: the whole world is working because the concept of “time” exists. Within a security (or any other) system this is not different: recording schedules, logging, authorizations, encryption keys, timelines, all of these concepts can exist because of time. As a result, time can either make or break a system: problems can appear only due to a time difference of a couple of seconds between two system components. The attached document describes how time services can be configured in a BVMS environment.
    View full article
    100% helpful (2/2)
    ‎10-28-2019 08:43 PM
    BVMS Installer - Windows Pending Restart Message Issue:  The pop-up dialog window message: "Setup has detected a pending restart.  Please reboot the system and rerun the installation"  appears when attempting to run the valid BVMS windows installer package. BVMS Installer Pending Restart Message   Cause:  This is a known Windows specific problem when another (non-BVMS) installer does not properly manage its creation and deletion of the “PendingFileRenameOperations” registry key. The most common user created way for this key value to be left resident in the system is when an installation prompts for a restart, yet the system is not expeditiously restarted.     Resolution:  A. Restart the affected workstation B. If the issue still persists, delete the orphaned "PendingFileRenameOperations" registry key value Open a registry editor, such as Regedit.exe or Regedt32.exe.   Navigate to "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\" In the right navigation pane, right-click the "PendingFileRenameOperations" key value and select delete Close Registry Editor. Run the software Installer again as Administrator   Note:  This message is not a Bosch product failure message. This is a problem within windows and it's registry clean-up handling.  This is a Windows work around. 
    View full article
    ‎03-27-2020 11:47 AM
     The attached document (attachements can be found on the bottom of the page) describes how Streamlining works and how it can be finetuned.
    View full article
    ‎08-17-2018 07:34 AM
      The attached document, which can be found in the attachments iconn on the bottom or right side of the page, shows the keyboard shortcuts that can be used by operators when operating the BVMS system. 
    View full article
    ‎06-18-2020 02:57 PM
    Collect Video SDK Logs for VSDK based applications:
    View full article
    ‎05-14-2018 06:27 PM
    This article guides you through the process of activating Bosch VMS Audio Intercom functionality on Windows 7.
    View full article
    ‎05-21-2018 08:39 PM
    This article guides you through the process of installing the BVMS Logbook Health Checker. The Bosch VMS Logbook Health Checker is a tool that is capable of fixing the overflow of the Bosch VMS Logbook database before it occurs.
    View full article
    ‎04-01-2019 12:31 PM
    Related Products: BVMS SDK, BVMS    Overview: BVMS Scriptlets can be debugged via logging to a logger file or messaging to the Operator workstation. This article describes how to enable BVMS Scriplet logging. You can log to the Server Script log or the Client Script log. Logs are default send to C:\ProgramData\Bosch\VMS\Log   1.Creating Log files ClientScriptLogger – automatically created Creates file “ClientScriptLog.txt” ServerScriptLogger - automatically created  Creates file “ServerScriptLog.txt” 2.Log information to the log files There are 3 methods to log information: Log Info Log Error Log Debug   Examples: [Scriptlet("59c4d66e-9395-4dcc-8d27-90dc2b7a00c4")] public void DemoLogger() { //use refence:C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727 MessageBox.Show("Hello World"); Logger.Info("Hello World script started"); Logger.Error("Hello World script started"); Logger.Debug("Hello World script started"); // Not writing to ClientScriptLog.txt ! } 3.Logging Location - C:\ProgramData\Bosch\VMS\Log. The logs are automatically collected by the BVMS Configuration Collection Tool. 4.Changing the location of the BVMS Scriplet Logging. Server Scripts : Logging Directory can be found in the file: C:\Program Files (x86)\Bosch\VMS\AppData\Server\CentralServer\BvmsLogCfg.xml and is defined by the ServerScriptLogAppender path: Default: </appender> <appender name="ServerScriptLogAppender" type="Bosch.Vms.Shared.Logging.Imp.RollingFileAppender, Bosch.Vms.Shared.Logging.Imp"> <file value="%CommonApplicationData%\\Bosch\\VMS\\Log\\ServerScriptLog.txt"/> Client Scripts : Logging Directory can be found in the file: C:\Program Files (x86)\Bosch\VMS\AppData\Client\OpClient\ApplicationWiring\Nvr\LogCfg.xml and is defined by the ClientScriptLogAppender path: Default: </appender> <appender name=“ClientScriptLogAppender" type="Bosch.Vms.Shared.Logging.Imp.RollingFileAppender, Bosch.Vms.Shared.Logging.Imp"> <file value="%CommonApplicationData%\\Bosch\\VMS\\Log\\ClientScriptLog.txt"/>            
    View full article
    ‎05-13-2018 02:30 PM
    Standard Service Documents The calculation of the storage capacity is done in different way in Configuration Client and VRM Monitor: - In BVMS Configuration Client Capacity (GB) stands for the available physical capacity of the storage, as calculated and provided by the storage vendor (for example NetApp). -In VRM Monitor – under Target Overview – Total is listed the number of all available blocks multiplied by the size of the blocks that is by default 1GB. This calculation concerns the logical storage and depends on the way the storage is used (for example how many Luns are imported in the system).
    View full article
    100% helpful (1/1)
    ‎04-06-2020 06:19 PM
    The VRM eXport wizard is a tool that allows you to export video directly from the VRM. You can find the VRM eXport wizard setup file in the bonus directory of the BVMS zip file. Exports made with the VRM eXport Wizard 1.20.0010 can be open in BVMS (Viewer) 9.0 or newer. The attached document describes how to use the VRM eXport Wizard. BVMS 10 comes with the VRM eXport Wizard 1.20.0016.
    View full article
    ‎05-21-2018 08:47 PM
    Can I upgrade existing BVMS Pro system to a BVMS Enterprise system?
    View full article
    ‎03-17-2019 06:55 PM
    Question How can I find the source (details of the workstation) and credentials that are used to attempt to login into BVMS (when the attempt has failed)? Answer The username that is used to login is saved into the BVMS logbook and can be found by searching the logbook from the Operator Client (username of login is "blabla").   The details of the workstation (mainly the IP address) is logged into the BVMS client log files. These can be found on the workstations in the directory: C:\ProgramData\Bosch\VMS\Log (Hint: for log file analysis a lot of free / open source tools are available. Snaketail is one of these tools, and can be found here.) Open the BVMSClientLog.txt (there could be multiple files which are all related to a different timeframe) and search for the phrase "InvalidCredentialException". If an user has tried to login to the system the following log lines should be present in the log file: 2019-03-17 18:31:53,668 75516 [GUI Thread] INFO Bosch.Vms.Frontend.OpClient.Wcf.DataAccessServiceClient ConnectAndAuthenticate - Call failed with InvalidCredentialException 2019-03-17 18:31:53,670 75518 [GUI Thread] INFO Bosch.Vms.Frontend.OpClient.ServerManagement.CentralServerManager AuthenticateAtMainServer - Main-Server 192.168.20.190: WCF online authentication result is WrongUserOrPassword This needs to be checked for every workstation which runs the BVMS Operator Client.  
    View full article
    ‎05-21-2018 08:42 PM
    In Bosch VMS it is possible to assign an LDAP user group to a Bosch VMS user group. This article describes why it is important to not assign the same LDAP user group to multiple Bosch VMS user groups.
    View full article
    Tuesday
    The attached document describes how a Tattile camera can be connected to BVMS and describes the provided functionality in the BVMS operator client. We recommend keeping the Tattile camera documentation and BVMS configuration manual at hand to fine tune the system configuration to the specific needs of your project.
    View full article
    ‎03-30-2020 02:50 PM
    Question How can I use "virtual" cameras to demonstrate BVMS? Answer Demonstrating a video surveillance system typically requires a couple of cameras. However, when you only have a couple of cameras, the screen can look boring and empty. Did you know you can use the video streaming gateway to pull in any online JPEG picture as a camera into BVMS? This makes your demonstration more interesting! Additionally, you can set-up your own webserver and host customer JPEG images yourself. You can find a warehouse example below, fully based on JPEG based static images. The attached document describes how to configure JPEG cameras.
    View full article
    ‎05-16-2018 09:36 PM
    Related Products Bosch Video Management System   Issue When opening a new Image pane in Live Mode, the camera image is discolored, i.e. there is a green cast or the image is displayed in black and white. When viewing the same camera image with the webbrowser, the live image is properly colored.   Solution Update the graphics card driver. Refer to BVMS release notes: they list the recommended graphics card driver versions to be used. 
    View full article
    ‎09-24-2020 01:03 PM
    Exporting video with Video Analytics meta data is very useful in the process of optimization of Video Content Analytics performance. One could configure VA, record particular scene and then replay this scene over and over again using different VA configurations. Moreover the video could be exported and replayed multiple times with different VA configuration settings. This article describes the different possibilities - BVMS Operator Client and BVMS Viewer, VRM eXpport Wizard, Web Interface of a Bosch Camera. The choice of the tool depends on the way the camera and recording are managed. 
    View full article
    Top Contributors
    Icon--AD-black-48x48Icon--address-consumer-data-black-48x48Icon--appointment-black-48x48Icon--back-left-black-48x48Icon--calendar-black-48x48Icon--center-alignedIcon--Checkbox-checkIcon--clock-black-48x48Icon--close-black-48x48Icon--compare-black-48x48Icon--confirmation-black-48x48Icon--dealer-details-black-48x48Icon--delete-black-48x48Icon--delivery-black-48x48Icon--down-black-48x48Icon--download-black-48x48Ic-OverlayAlertIcon--externallink-black-48x48Icon-Filledforward-right_adjustedIcon--grid-view-black-48x48IC_gd_Check-Circle170821_Icons_Community170823_Bosch_Icons170823_Bosch_Icons170821_Icons_CommunityIC-logout170821_Icons_Community170825_Bosch_Icons170821_Icons_CommunityIC-shopping-cart2170821_Icons_CommunityIC-upIC_UserIcon--imageIcon--info-i-black-48x48Icon--left-alignedIcon--Less-minimize-black-48x48Icon-FilledIcon--List-Check-grennIcon--List-Check-blackIcon--List-Cross-blackIcon--list-view-mobile-black-48x48Icon--list-view-black-48x48Icon--More-Maximize-black-48x48Icon--my-product-black-48x48Icon--newsletter-black-48x48Icon--payment-black-48x48Icon--print-black-48x48Icon--promotion-black-48x48Icon--registration-black-48x48Icon--Reset-black-48x48Icon--right-alignedshare-circle1Icon--share-black-48x48Icon--shopping-bag-black-48x48Icon-shopping-cartIcon--start-play-black-48x48Icon--store-locator-black-48x48Ic-OverlayAlertIcon--summary-black-48x48tumblrIcon-FilledvineIc-OverlayAlertwhishlist