Important Cookie Information

This website uses absolutely necessary cookies. If you consent to the use of convenience cookies, please click “Yes, I agree.” By clicking on “Privacy Settings.” you can change this setting at any time and withdraw your given consent. Icon down see more You can find detailled information in our Privacy Policy Icon forward-right
Icon up see less

Bosch Building Technologies

    cancel
    Showing results for 
    Search instead for 
    Did you mean: 

    Security: Video

    Sort by:
    ‎09-03-2019 01:41 PM
    Dear users, have you ever wondered how to best transition from the Project Assistant to (B)VMS? This article aims at providing you a recommendation and the answer is quite simple: Use the Project Assistant to its full extent and once the cameras are connected to the target network, perform a network scan using the BVMS Configuration Client, to add the respective cameras to the system. The remaining fine-grained settings can then be tackled within BVMS.  For details, please check out the attached presentation. Let us know, if you have further questions and share your comments below. Best regards, Your Bosch Security App Team    
    View full article
    100% helpful (1/1)
    a week ago
    Introduction: Bosch has been providing 2 types of VRM packages: a 32bit and a 64bit version. Since VRM 3.82 we are only offering the 64bit version. As all of our released DIVAP IP units started off as 32bit VRM which includes a Transcoder service. Problem If you do not use the Start.exe included in the VRM Master Installer, you will not be offered the oppertunity to also upgarde the Transcoder. Just running the Setup_VRM_Service_<version>.exe found in the <Install\Bosch> folder, will cause the Transcoder service to stop functioning! This includes if the upgarde is done via BVMS installer. Since BVMS 10.0, VRM 3.82 "64bit" was implemented. Due to the fact that BVMS does not manage the transcoder, it was not installed. Also see Firewall settings: HowTo Configure Windows Firewall Rules, includes PS script to adjust the VRM 64bit and Transcoder rules. Solution Download the appropriate VRM version from our Downloadstore Run the Start.exe Deselect all components and choose only the Transcoder Service   Click on "Install" To confirm that the Transcoder is fully functional, open your browser and navigate to the VRM Monitor: https://<VRM_IP_Address>/ Log in with you Credentials    
    View full article
    ‎09-19-2019 08:32 AM
    The attached document aims to provide concerned parties, such as customers, users, operators or consultants, with an overview of data privacy and protection related features of BVMS Person Identification. Moreover, this document describes how data, as processed during the Person Identification steps, can be classified. Finally, this document lists technical measures for data protection in the context of BVMS Person Identification.
    View full article
    ‎05-16-2018 09:15 PM
    This article illustrates how to avoid timeouts in the "jump to next"/"jump to previous" functionality for recordings.
    View full article
    ‎05-21-2018 08:36 PM
    Related Products Bosch Recording Station (BRS) version 8.9 and later   Question I cannot configure UDP tunneling on BRS. Network cards are grayed out.   Answer Under certain circumstances BRS NetLimiter may become not registered. The network cards are not shown in Configuration > Security and Network > Network settings. In that case, register BRS NetLimiter manually: 1. Close BRS application 2. Control Panel > System and Security > Administrative Tools > Services > Bosch Networking Service    a) Set "Startup Type" to "disabled"    b) Stop service    c) In a console window with administrative rights, enter "C:\Program Files\Bosch\Recording Station\NetLimiterServer" /service    d) Set "Startup Type" to "Automatic"    e) Start service 3. Start BRS application
    View full article
    ‎05-16-2018 09:22 PM
    Related Products DHR 700 series DNR 700 series H.264 SD IP cameras   Question How can I record SD H.264 cameras in Main Profile (MP)?   Answer For the IP cameras disable the setting "SD display on local monitor required" - then the camera is disabled for live viewing but it is recorded in MP and can been seen via the BVC.
    View full article
    ‎05-18-2018 01:39 PM
    Related Products Bosch encoders Answer Place this in the alarm task editor and save it.  Please read the comments for more details.  They are noted below by //. //Define weekly timer from Monday to Sunday from 7am to 9pm Timer weekly := {TimeBegin(07:00) TimeEnd(21:00) DayBegin(Mo) DayEnd(Su) }; //define what is to be recorded Recording recording:= { Camera(All) }; // Define Operation Mode to periodic, 1 sec low 30 min high OperationMode periodic := { Low(10) High(18000) }; TempState(1):=periodic; //define recording timer OperationMode monostable := {High(50)}; TempState(2):=monostable; //Turn on recording timer if (IsActivated(weekly)) then TempState(1) := true; if (TempState(1)) then TempState(2) := true; if (TempState(2)) then recording else Stop(recording);
    View full article
    ‎05-20-2019 04:54 PM
    Question What's new or fixed in Project Assistant 1.2.3? Answer This release concentrates on general stability improvements and bug fixes. We could address three findings thanks to your feedback: Keyboards on Samsung devices sometimes got stuck (Android only) Dropbox sync showed unexpected behavior when sharing a project Wireless Connectivity Flexidome IP 8000i: “Camera found nearby – connect” dialog although being properly connected to the camera already
    View full article
    ‎05-18-2018 07:48 PM
    Related Products BVMS OPC Server   Question List with restricted symbols when using BVMS OPC Server.   Answer BVMS OPC server restricts the use of some symbols in the camera names. We can divide them into 3 groups: - XML restricted symbols. For the OPC server the device configuration is exported in a XML file. So no reserved XML characters should be used as they will be replaced by blanks when exporting the OPC file. XML restricted characters: : & < > " ' - OPC Specification restricted symbols. OPC Specification restricts the use of: " ´ ` ' # - OPC namespace delimiters: . , /
    View full article
    ‎05-18-2018 01:23 PM
    How many streams can use the BP+ profile?
    View full article
    ‎05-21-2018 08:30 PM
    Related Products DVR 700 series BVIP device   Question Why does Divar 700 change the settings of 2nd stream, even though only 1st stream is configured in the DVR?   Answer Divar 700 uses the concept where it assumes to be the (master) device to have control over the cameras and their streams. Stream 1 is always set to profile 1 Stream 2 is always set to profile 2 Only one command is sent from DVR to set both stream 1&2 So please configure profile 2 in the wanted way to be used with stream 2.
    View full article
    ‎05-18-2018 07:48 PM
    Related Products Bosch Video Client (BVC) Question Where can I find my stored recordings?   Answer Default path of the recordings is set as: C:\Documents and Setting\Admin\My Documents\Bosch\Video Client\Recordings This path can be changed in the configuration manager under the tab System > Applications > Video Client > Application > Manual Recording
    View full article
    ‎07-22-2019 01:46 PM
    This article shows how to configure Input Alarm and later search for them in the Event search using Web Interface. There are only 3 different search parameters for Event type search, which are "All", "Motion" and "Alarm". Once can search for any alarms during the set time period and channel and in this way indirectly to filter for Input Alarm (if only Input Alarm triggers Recording for a particular channel). It is not possible to directly narrow the search for particular Alarm type (ex. Input alarm). 1.Configure the Input Alarm. Go to: Settings - Alarm - Input Alarm. Click Enable and Chose the respective Input (from 1 to 16), then click Record Channel and Save.  Note: The other Settings like Buzzer, Display Mon. A can also be configured but is not a must for performing Even Search. Schedule the recording. Settings - Schedule: Chose the days of the week, the time and enable "Alarm" Set the recoding stream. Settings - Storage - Recording: Chose the stream to be recorded. 2. Event Search - Chose the respective Camera (that recorded on Alarm Input) and search for "Alarm"
    View full article
    ‎05-21-2018 08:30 PM
    Related Products VIPXD (Audio Version)   Question Why there is NO sound from a loudspeaker connected to a VIPXD SPK port?   Answer The RTC_AUDIO_LOUDSPEAKER_ON_OFF flag is not activated. This flag can be set manually by using this CGI command: http://160.10.x.x/rcp.xml?command=0x09be&type=F_FLAG&payload=1&direction=WRITE&num=1 Replace 160.10.x.x by your VIPXD IP address.
    View full article
    ‎07-30-2019 07:37 PM
    Problem: When installing Configuration Manager v6.20.0102 on Windows 10 and error message is received during installation of .NET Framework v4.7.2 that states: Blocking Issues: The .NET Framework 4.7.2 is not supported on this operating system.     Cause:   Windows 10 requires frequent updates that must be installed to keep the system compatible with new software installations.   Windows 10 periodically releases a features update package that provides new features and compatibility.  These are required for version of .NET framework installation.    Windows 10 release Information Feature updates for Windows 10 are released twice a year, around March and September, via the Semi-Annual Channel and will be serviced with monthly quality updates for 18 months from the date of the release. We recommend that you begin deployment of each Semi-Annual Channel release immediately as a targeted deployment to devices selected for early adoption and ramp up to full deployment at your discretion. This will enable you to gain access to new features, experiences, and integrated security as soon as possible. Above except from Microsoft's Windows 10 Release information document:  https://docs.microsoft.com/en-us/windows/release-information/     Resolution: Option 1 - This option  will require an active internet connection.   Using the windows search function (Windows key+S), search for "Windows Update Setting" Click "Check for Updates" Install all available updates Option 2 - This option will not require an internet connection.  It will require multiple steps be performed per the Microsoft websites guidelines to create and burn a windows update DVD using a downloadable .ISO file provided directly from Microsoft.  You can find these instructions and links on Microsoft's website here:  https://www.microsoft.com/en-au/software-download/windows10
    View full article
    ‎06-05-2019 02:16 PM
    Microsoft Event Logging, when an error occurs, the system administrator or Integrator must determine what caused the error. The operator can then use the event log to help determine what conditions caused the error and identify the context in which it occurred. Starting Event Viewer The procedure for starting Event Viewer depends on your starting point, e.g. windows key + R type in ”eventvwr.msc” hit enter. Selecting Computers With the decent administrative access, you can select any computer in your network to view that Microsoft system event logs. To select computers in Event Viewer: In the top of the console tree, right-click Event Viewer (local), and then click Connect to another computer. Enter FQDN/NetBIOS name or browser to the regarding machine Adjusting Event Viewer Settings In the console tree, right-click the appropriate log file, and then click Properties. Click the General tab. Saving Event Logs In the console tree, right-click the appropriate log file, and then click Save Log File As. Navigate to the subfolder in which you want to save the file, type a name for the file, click the file type, and then click Save. Clearing Event Logs In the console tree, right-click the appropriate log file, and then click clear all Events. You are prompted for whether you want to save the log to a file before clearing it. Click “Yes” to save a log and clear all events. If you click No, the log is not saved, but all events are cleared from the selected Event log. If you click Cancel, the request to clear the log is canceled. Viewing Event Details In the console tree, right-click the appropriate log file. A list of events in the log file is displayed in the details pane of Event Viewer. Click a specific event in the details pane to display the Event Properties dialog box and details about the event. Filtering Events In the console tree, right-click the appropriate log file, and then click Properties. Click the Filter tab. Type the appropriate information that you would like to filter. Finding Events In the console tree, right-click the appropriate log file. On the View menu, click Find. Type the appropriate information that you would like to find in the dialog box, and then click Find Next.   Event Types: Event type Description Error An event that indicates a significant problem such as loss of data or loss of functionality. For example, if a service fails to load during startup, an Error event is logged. Warning An event that is not necessarily significant, but may indicate a possible future problem. For example, when disk space is low, a Warning event is logged. If an application can recover from an event without loss of functionality or data, it can generally classify the event as a Warning event. Information An event that describes the successful operation of an application, driver, or service. For example, when a network driver loads successfully, it may be appropriate to log an Information event. Note that it is generally inappropriate for a desktop application to log an event each time it starts. Success Audit An event that records an audited security access attempt that is successful. For example, a user's successful attempt to log on to the system is logged as a Success Audit event. Failure Audit An event that records an audited security access attempt that fails. For example, if a user tries to access a network drive and fails, the attempt is logged as a Failure Audit event.   The events themselves are what we’re trying to see, of course, and their usefulness can range from really specific and obvious things that you can fix easily to the totally undefined messages that don’t make any sense and you can’t find any information on your preferred search engine. example: The regular fields on the display contain: Log Name – while in older versions of Windows everything got dumped into the Application or System log, in the more modern editions there are dozens or hundreds of different logs to choose from. Each Windows component will most likely have its own log. Source – this is the name of the software that generates the log event. The name usually doesn’t directly match with a filename, of course, but it is a representation of which component did it. Event ID – the all-important Event ID can actually be a little confusing. If you were to Google for “event ID 122” that you see in the next screenshot, you wouldn’t end up with very useful information unless you also include the Source, or application name. This is because every application can define their own unique Event IDs. Level – This tells you how severe the event is – Information just tells you that something has changed or a component has started, or something has completed. Warning tells you that something might be going wrong, but it isn’t all that important yet. Error tells you that something happened that shouldn’t have happened, but isn’t always the end of the world. Critical, on the other hand, means something is broken somewhere, and the component that triggered this event has probably crashed. User – this field tells you whether it was a system component or your user account that was running the process that caused the error. This can be helpful when looking through things. OpCode – this field theoretically tells you what activity the application or component was doing when the event was triggered. In practice, however, it will almost always say “Info” and is pretty useless. Computer – on your home desktop, this will usually just be your PC’s name, but in the IT world, you can actually forward events from one computer or server to another computer. You can also connect Event Viewer to another PC or server. Task Category – this field is not always used, but it ends up basically being an informational field that tells you a bit more information about the event. Keywords – this field is not usually used, and generally contains useless information. As a rule of thumb (common way of doing), you should try searching by the general description, or the Event ID and the source, or a combination of those values. Just remember that the Event ID is unique for each application. So there is a lot of overlap and you can’t just search for “Event ID 122” only. This is because users might find the list is too large and too general, your specific search aspect might not fit your issue.
    View full article
    ‎09-18-2019 09:17 AM
    As video surveillance use grows in commercial, government and private use cases, the need for low-cost storage at scale is growing rapidly. BVMS, Bosch cameras, HPE hardware and SUSE Enterprise Storage provide a platform that is an ideal target for recording these streams. There are numerous difficulties around storing unstructured video surveillance data at massive scale. Video surveillance data tends to be written only once or become stagnant over time. This stale data takes up valuable space on expensive block and file storage, and yet needs to be available in seconds. With this massive scale, the difficulty of keeping all the data safe and available is also growing. Many existing storage solutions are a challenge to manage and control at such scale. Management silos and user interface limitations make it harder to deploy new storage into business infrastructure. The solution is software-defined storage (SDS). This is a storage system that delivers a full suite of persistent storage services via an autonomous software stack that can run on an industry standard, commodity hardware platform. Bosch, Hewlett Packard Enterprise (HPE) and SUSE have partnered to deliver the benefits of SDS to the video surveillance industry. Using SUSE Enterprise Storage™ on HPE ProLiant DL and Apollo servers in a Bosch video surveillance environment simplifies the management of today’s volume of data, and provides the flexibility to scale for all enterprise storage needs. The full description can be found in the attached whitepaper.
    View full article
    ‎03-01-2019 11:56 AM
    Collect Video SDK Logs for VSDK based applications:
    View full article
    a week ago
    This article provides you with information related to the Windows Firewall, how to access, configure and adjust it.   Firewall A firewall is a program installed on your machine or a piece of hardware in your network, that uses a rule-set to block or allow access to a computer, server or network. It seperatres dedicated network segments, likly your LAN from the Internet. Firewalls can permit traffic to be routed through a specific port to a program or destination, while blocking all other traffic.   Windows Firewall The Windows Firewall interface can be accessed multiple ways. The  way we will look during this TB is via the Windows search function. Click the Windows icon and type in “firewall“.  Then, click on the “Windows  Firewall with Advanced Security” icon.   The GUI provides you a general overview, about the basic function of the software. Displaying the current status of the firewall also which profiles are currently set up. By default the firewall should be enabled. We strongly recommend that the Windows Firewall is enabled on all your Bosch devices featuring a Windows Operating System.   Firewall profiles There are 3 different profiles within your Windows Firewall, which are simply groups of different firewall rule-sets, depending where your machine is currently connected. Public Profile: This profile is used when the computer is connected directly to a public network like a restaurant, library or airport. This profile should be the most restrictive because security is usually not well controlled in public places. Private Profile: This profile is used if your are only connected to  a private network, not directly to the Internet. In these cases, your device is located behind a router or hardware firewall. Which allows to set this profil less restrictive. Domain Profile: This profile is used when the machine is connected to a domain controller, which in turn is controlling a windows domain. This profile should be the least restrictive of the other  profiles because security is usually very well controlled within a domain.   Standdard rule-set by default the Windows Firewall behavior is the following:  Windows Firewall never blocks outgoing traffic. Any requests sent out from the server will not be hindered in any way. Windows Firewall blocks all incoming traffic, except for traffic that is in responses to a request. This means that if you make a request to Google, Google’s inbound reply to your outbound request will not be blocked. Windows Firewall blocks all other traffic. This means that any traffic that is not explicitly allowed is blocked in the firewall. In the Windows Firewall we can filter connection in two different kinds: port exceptions (rule assigned to a dedicated port number)  and program exception (rule assigned to a dedicated program)   In general we need to distinguish between the inbound (frome somewhere to your machine) and outbound (from your machine to somewhere) rule-set.   Open a port in the firewall (inbound rule) In the Windows Firewall with Advanced Security window, right-click "Inbound Rules", and then click "New Rule..." in the action pane. "Rule Type" dialog box, select "Port" depending on your need and then click "Next". In the "Protocol and Ports" dialog box, select "TCP". Then select "Specific local Ports", and then type the port number and then click "Next". In the "Action" dialog box, select "Allow the connection" and then click "Next". In the "Profile" dialog box, select any profiles that apply and then click "Next". (We have allowed all three for demonstration purposes, your selection may vary.) In the "Name" dialog box, type a name and description for this rule, and then click "Finish". At this point, you will now see a new rule in the main firewall rules in the center section, as well as a new listing in the right window panel.   Open a program in the firewall (inbound rule) Click on the "Inbound Rules" option on the top left of the firewall interface. Then, click on the "New rule…" Under "Rule Type" dialog box, select the option "Program" and then click "Next". Select the option "This Program path" browse to the path/location of the program  and click "Next". Next, we select the option “Allow the connection” and then click “Next”. Select the "Profile" the rule will be applied to and click "Next". (We have allowed all three for demonstration purposes, your selection may vary.) Select a "Name" and "Description" for this rule and then Click “Finish”. At this point, you will be dropped back to the main firewall screen. You will now see a new rule in the main firewall rules in the center section, as well as a new listing in the right window pane   Edit a port / program in the firewall Right-click on the rule which will open a context menu. Then click  "Properties" and adjust the rule according your needs .   Close a port / program in the firewall Right-click on the rule which will open a context menu. Then click  " Delete".       Adjust program rule after BVMS upgrade In case you upgraded your current BVMS up to BVMS10, refering to the article TSG-Upgrading-VRM-from-32bit-to-64bit you need to adjust the inbound + outbound rule "Bosch VRM Server" and  "USB Transcoder". Therefore right-click on the rule which will open a context menu. Then click "Properties" and adjust the programs path to: Bosch VRM Server: "C:\Program Files\Bosch\Video Recording Manager\VRM Server\bin\rms.exe" USB Transcoder: "C:\Program Files (x86)\Bosch\Video Recording Manager\VRM Server\bin\usbsvc.exe" Keep in mind, that you need to perform this action on all four rules (inbound and outbound) Alternatively download the attachment set_fw_rules.zip (1 KB) locally to your device, extract the archive and run the PowerShell script "set_fw_rule_trancoder.ps1" as administrator. The script will adjust all necessary rules.
    View full article
    4 weeks ago
    Question What's new in version 1.3.1? Answer Dear users, thank you for working with the Bosch Project Assistant. Based on your feedback, we have introduced the following improvements and features to make its use even more effective and enjoyable: • Sorting option on project overview page • Easier and faster removal of cameras from a project • Time server support • Re-commissioning support for VRM-managed cameras (focus on Flexidome IP 8000i) • Configuration mismatch (between project/app and camera) resolution dialog • Integration of Bosch Portable camera installation tool (NPD-3001-WAP), i.e. automatic detection of its wireless access point, management of multiple tools, and configuration of the tool’s network settings within the app Please check out the updated article " How-to: connect to and configure the portable camera installation tool ". Here we have added new videos that help you to get started and which explain the sepcifics of the different platforms - iOS, Android and Windows. Enjoy! Your Bosch Security App Team PS: For details, please have a look at the latest release letter in our Bosch Security Download Area.
    View full article
    Top Contributors
    Icon--AD-black-48x48Icon--address-consumer-data-black-48x48Icon--appointment-black-48x48Icon--back-left-black-48x48Icon--calendar-black-48x48Icon--center-alignedIcon--Checkbox-checkIcon--clock-black-48x48Icon--close-black-48x48Icon--compare-black-48x48Icon--confirmation-black-48x48Icon--dealer-details-black-48x48Icon--delete-black-48x48Icon--delivery-black-48x48Icon--down-black-48x48Icon--download-black-48x48Ic-OverlayAlertIcon--externallink-black-48x48Icon-Filledforward-right_adjustedIcon--grid-view-black-48x48IC_gd_Check-Circle170821_Icons_Community170823_Bosch_Icons170823_Bosch_Icons170821_Icons_CommunityIC-logout170821_Icons_Community170825_Bosch_Icons170821_Icons_CommunityIC-shopping-cart2170821_Icons_CommunityIC-upIC_UserIcon--imageIcon--info-i-black-48x48Icon--left-alignedIcon--Less-minimize-black-48x48Icon-FilledIcon--List-Check-grennIcon--List-Check-blackIcon--List-Cross-blackIcon--list-view-mobile-black-48x48Icon--list-view-black-48x48Icon--More-Maximize-black-48x48Icon--my-product-black-48x48Icon--newsletter-black-48x48Icon--payment-black-48x48Icon--print-black-48x48Icon--promotion-black-48x48Icon--registration-black-48x48Icon--Reset-black-48x48Icon--right-alignedshare-circle1Icon--share-black-48x48Icon--shopping-bag-black-48x48Icon-shopping-cartIcon--start-play-black-48x48Icon--store-locator-black-48x48Ic-OverlayAlertIcon--summary-black-48x48tumblrIcon-FilledvineIc-OverlayAlertwhishlist