Help
  • Explore Community
  • Get Started
  • Ask the Community
  • How-To & Best Practices
  • Contact Support
Notifications
Login / Register
Community
Community
Notifications
close
  • Categories
  • Forums
  • Knowledge Center
  • Blogs
  • Ideas
  • Events & Webinars
Help
Help
  • Explore Community
  • Get Started
  • Ask the Community
  • How-To & Best Practices
  • Contact Support
Login / Register
Sustainability
Sustainability

Building Automation Knowledge Base

Schneider Electric Building Automation Knowledge Base is a self-service resource to answer all your questions about EcoStruxure Building suite, Andover Continuum, Satchwell, TAC…

Search in

Improve your search experience:

  • Exact phrase → Use quotes " " (e.g., "error 404")
  • Wildcard → Use * for partial words (e.g., build*, *tion)
  • AND / OR → Combine keywords (e.g., login AND error, login OR sign‑in)
  • Keep it short → Use 2–3 relevant words , not full sentences
  • Filters → Narrow results by section (Knowledge Base, Users, Products)
cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Show  only  | Search instead for 
Did you mean: 
  • Home
  • Schneider Electric Community
  • Knowledge Center
  • Building Automation Knowledge Base
  • Building Automation Knowledge Base
  • Label: EcoStruxure Security Expert
Options
  • My Knowledge Base Contributions
  • Subscribe
  • Bookmark
  • Invite a Friend
Invite a Co-worker
Send a co-worker an invite to the portal.Just enter their email address and we'll connect them to register. After joining, they will belong to the same company.
You have entered an invalid email address. Please re-enter the email address.
This co-worker has already been invited to the Exchange portal. Please invite another co-worker.
Please enter email address
Send Invite Cancel
Invitation Sent
Your invitation was sent.Thanks for sharing Exchange with your co-worker.
Send New Invite Close
Labels
Top Labels
  • Alphabetical
  • Andover Continuum 2,197
  • TAC Vista 2,029
  • EcoStruxure Building Operation 1,894
  • TAC IA Series 1,785
  • TAC INET 1,449
  • Field Devices 722
  • Satchwell BAS & Sigma 402
  • EcoStruxure Security Expert 343
  • EcoStruxure Building Expert 222
  • Satchwell MicroNet 212
  • EcoStruxure Access Expert 153
  • CCTV 52
  • Project Configuration Tool 48
  • EcoStruxure Building Activate 19
  • EcoStruxure Building Advisor 13
  • ESMI Fire Detection 13
  • Automated Engineering Tool 5
  • EcoStruxure Building Data Platform 3
  • EcoStruxure Workplace Advisor 1
  • EcoStruxure for Retail - IMP 1
Top Contributors
  • Product_Support
    Product_Support
  • DavidFisher
    DavidFisher
  • CraigEl
    CraigEl
See More Contributors
Related Products
Thumbnail of EcoStruxure™ Building Operation
Schneider Electric
EcoStruxure™ Building Operation
4
Thumbnail of SmartX IP Controllers
Schneider Electric
SmartX IP Controllers
1
Thumbnail of EcoStruxure™ Building Advisor
Schneider Electric
EcoStruxure™ Building Advisor
1

Related Forums

  • Intelligent Devices Forum

Previous Next

Invite a Colleague

Found this content useful? Share it with a Colleague!

Invite a Colleague Invite

Label: "EcoStruxure Security Expert"

View in: "Building Automation Knowledge Base" | Community

342 Posts | First Used: 2018-09-06

Building Automation Knowledge Base

Sort by:
Date
  • Date
  • Views
  • Likes
  • Helpfulness
Options
  • Subscribe
  • Bookmark
  • Invite a Friend
  • « Previous
    • 1
    • 2
    • 3
    • …
    • 18
  • Next »
Label: "EcoStruxure Security Expert" Show all articles

Security Expert – Avigilon PTZ Integration Command String Clarification

Issue The command string referenced in AN-355 for Avigilon PTZ integration with Security Expert is unclear, leading to confusion about which command should be entered. Product Line EcoStruxure Security Expert Environment EcoStruxure Security Expert Avigilon VMS Cause AN-355 documentation states that a command string must be entered into Security Expert but does not specify the exact format or value, causing ambiguity during configuration. Resolution To configure PTZ commands for Avigilon integration in Security Expert: Navigate to Monitoring > Setup > PTZ Commands. Create a New PTZ Command. Under Configuration, select the target Camera. In the Command String field, enter the Preset number programmed in Avigilon. This number corresponds to the desired preset position that will be sent to the DVR. Example: If Avigilon has presets labeled 0, 1, 2, and 3, entering 0 in the Command String will move the camera to Preset 0.
View full article
Admiral Alan_Wood Admiral
‎2025-11-25 03:24 PM

on ‎2025-11-25 03:24 PM

Labels:
  • EcoStruxure Security Expert
5 Views

Mass importing User Photos into Security Expert using Data Sync Service

Issue Need a method for mass importing User photos for creating / updating the Users for a Security Expert site. Product Line Security Expert Environment Security Expert Security Expert Data Sync Service (SX-DB-SYNC) Warning Potential for Data Loss: The steps detailed in the resolution of this article may result in a loss of critical data if not performed properly. Before beginning these steps, make sure all important data is backed up in the event of data loss. If you are unsure or unfamiliar with any complex steps detailed in this article, please contact Product Support for assistance. Cause Data Sync Service is typically used to import data from the third party system.  In this instance, a CSV file containing the data to be imported into the Security Expert database is used. The Data Sync Service is configured to monitor the folder where this CSV file is located and automatically (if configured) import the relevant data into Security Expert, creating records (including users, access levels, areas, doors, schedules, and so on) for each matched entity. Resolution The Data Sync Service can be used to map specific fields from a CSV file to fields within Security Expert. One of those fields can be the User photos. Below is a guide on how to implement this.   1. Directory Setup Before opening the Security Expert Data Sync Service, it is necessary to setup a CSV file and directory for the Data Sync Service to work with. The only requirement for now is that each image must have a unique name and that the folder housing the images must be called "Photos". Figure 1 shows an example folder structure: Note: The names of the folder, CSV file and image names are not critical. As long as the image names match what is in the CSV file.   2. CSV File A CSV file is a comma separated file with each row being a separate record and columns (fields) separated by comma's. An example CSV is shown below:   UniqueID,FirstName,LastName,AccessLevel,PIN 101,First,User,Visitor,1284 102,Second,User,Visitor,5618 Note: The UniqueID field will need to be the file name of the Users image. For the below example CSV, two images must be present in /Photos/ with the names 101.jpg and 102.jpg.   3. Security Expert Operator It is recommended that a new Security Expert Operator is added for importing from the Data Sync Service. This ensures that records that have been added / modified / deleted by the Data Sync Service can easily be identified. To proceed past the Data Target section the Show PIN numbers for Users option must be enabled in the Operator object.   4. Data Target Now that an Operator, directory and CSV have been set up, open Security Expert Data Sync Service and follow these steps: Select Security Expert from the Target System dropdown. Confirm the SOAP Server Address. If the defaults were accepted during the installation of the SOAP Service, enter http://localhost:8030/SecurityExpertSOAPService/service.svc. Enter the Username of an Operator. Enter the Password for that Operator. From the Site dropdown, select the Site that the records are to be imported to. All Sites that have been added in Security Expert will be available in the dropdown. Overwrite the Site ID during the field mapping process if the records are imported to different Sites within a single import. Note: The rest of the fields on the Configuration window are disabled until a valid Server Address, Username and Password have been entered.   5. Sync Options Set the Resynchronize Every time to a time interval over which the service should resync data. Tick the Enable Error Log checkbox to populate the Event Viewer with events that will make error solving simpler.  6. Data Mapping  Configure the records and import file with the following steps. Select Users from the Record to Sync drop-down.  In the File Directory field, enter the created folder. If importing a single file, enter the name of the file in the Import File field. If the checkbox is left unticked, all files in the File Directory will be imported. From the File Format drop-down, select Delimited. If the import file is a CSV, select {CR}{LF} as the Row and {Comma} as Column delimiters. Enable the option to Start Import At Row 2 to skip the header.    7. Field Mapping The field mapping phase allows CSV columns (Source Column) to be mapped to a record type in the Security Expert Database (Target Field). To import the example CSV, the field mapping must be configured as below. Link a Target Field and Source Column, simply select both in the interface, complete the following: Link the following [Target Field : Source Column]: ImageID : 1, First Name : 2, Last Name : 3, UserAccessLevelGroupDataData > UserAccessLevel : 4 PINNumber : 5, Select ImageID (Column 1) as the Unique Field. For UserAccesLevel, open the Advanced Data Configuration by clicking the [ … ] button. Ensure that Use This Field As The Group Data Identifier is set and Grouping Type is Singular Data. Ensure Target Field Record Type is ticked and set to Access Levels. Click Save and then Start to begin the syncing of Users. 8. Troubleshooting If troubleshooting is required, examine the following logs: All Events - In Security Expert under Monitoring > Status Page View, open the All Events view to view Data Sync Service events. Event Viewer - Open the Windows Event Viewer and navigate to Event Viewer > Applications and Services Logs > Schneider Electric Security Expert event log.
View full article
Guinan AdamSteele Guinan
‎2018-11-15 10:30 PM

Labels:
  • EcoStruxure Security Expert
3363 Views

Security Expert Mobile App Unavailable on Android Devices

Issue Customer is unable to install the Security Expert Mobile app on newer Android devices. The app does not appear in the Google Play Store. Reported devices and OS versions: Samsung A15/A16 running Android 16, OneUI 7 Samsung S22 Ultra running Android 15, OneUI 7 Product Line EcoStruxure Security Expert Environment  Application: Security Expert Mobile App Platform: Android devices Store: Google Play Store Affected OS: Android 15 and Android 16 UI Version: OneUI 7 Cause The updated version of the Security Expert Mobile app has not yet been released on the Android Play Store. It is undergoing Cyber Security penetration testing and review, which is expected to complete by end of Q1 2026. Resolution Currently, the Security Expert Mobile app is not available for download on Android. Follow these steps for a workaround: Use the Protege Mobile app as an alternative: Go to the Google Play Store link. Download and install Protege Mobile. Log in using existing Security Expert credentials: Open the Protege Mobile app. Enter your Security Expert username and password. Confirm connectivity to your Security Expert system. Plan for future availability: The official Security Expert Mobile app for Android will be released after the Cyber Security review process (ETA: end of Q1 2026).
View full article
Guinan AdamSteele Guinan
‎2025-11-10 09:48 PM

on ‎2025-11-10 09:48 PM

Labels:
  • EcoStruxure Security Expert
98 Views

How to integrate Active Directory with Security Expert

Issue Understand methods for integrating Security Expert with Active Directory for creation and management of Operators and Users. Product Line EcoStruxure Security Expert Environment Security Expert Active Directory SX-AD-OPR SX-AD-USR SX-DB-SYNC PowerShell Cause Security Expert Active Directory Integration provides synchronization and authentication for Active Directory users enabling organizations to leverage on the user management and security policies that Active Directory provides. This article looks at the details between each integration option. Resolution There are four options for Active Directory Integration. 1. Default Windows Authentication option. This allows for logging in to Security Expert with the Windows User account credentials which could include AD users if on a Domain. Operator object must be created in Security Expert and configuration of windows authentication option has some specific steps to be followed for it to work. Unable to login to Security Expert using Windows Authentication Remember to use syntax "<domain>\<username>" for the username when configuring the Operator for a Windows user ON a  Domain. Remember to use syntax "<computername>\<username>" for the username when configuring the Operator for a Windows user that is NOT on a Domain. No extra license is required for this. 2. SX-AD-OPR : License for adding Security Expert Operators from AD. Security Expert Operators will need to be added manually using the following steps: Navigate to Operators and click Add. Check the Windows Authentication box. Click the ellipsis adjacent to the User Name. Use the Active Directory Users window to search for the AD credentials you wish to use. Once the Operator has been added, you may check the Windows Authentication option when logging in. 3. SX-AD-USR : License for adding Security Expert Users from AD. This will allow an active directory domain windows group to be periodically polled for updates that will in turn update the Users in Security Expert. Individual options for importing users, disabling user if AD user is disabled, disabling user if AD user is deleted. Only user names are imported, other than this only action can be disabling of users in Security Expert. No other details can be updated or added. See application note AN-141 Security Expert LDAP User Import Configuration. 4. SX-DB-SYNC : Data Sync Service with Powershell script. Powershell script pulls user details out of AD and writes to a CSV file that the Data Sync Service then imports into Security Expert. Can perform more functions than SX-AD-USR as any attribute from AD users can be mapped to any attribute in Security Expert users. Will require powershell experience as the sample script may need to be modified. See SEC-APP-03-1.0 – SX AD integration using PowerShell for a sample script and in-depth details on how to configure this solution for importing User data. See Security Expert Data Sync Service for details on setting up and using the Data Sync Service.
View full article
Guinan AdamSteele Guinan
‎2019-06-13 06:57 PM

Labels:
  • EcoStruxure Security Expert
4431 Views

How Areas are sorted when viewed on a Keypad

Issue The sort order of Areas displayed on different keypads is inconsistent when scrolling through them. Product Line EcoStruxure Security Expert Environment Security Expert SX-KLCS Keypad Cause In the keypad configuration, the "Area this LCD belongs to" setting determines the primary Area associated with the keypad—typically the Area where the keypad is physically installed. This Area is intended to appear first when a User logs in. Keypad Area If this setting is left as <not set>, the keypad will default to sorting Areas by their Area ID, rather than prioritizing a specific primary Area. Resolution The order in which Areas appear on the keypad is determined by the Access Levels assigned to the User who logs in. Specifically: The keypad displays Areas in the order they are defined within the User’s Access Levels. To ensure consistent Area sort order across all keypads, the Access Levels must be assigned in the same order for each User record. Important: Once Access Levels are added to a User record, they cannot be re-ordered. To change the order: Remove all Access Levels from the User record. Reassign them in the desired order.
View full article
Guinan AdamSteele Guinan
‎2025-10-28 10:25 PM

Labels:
  • EcoStruxure Security Expert
131 Views

How to latch an output when any inputs are enabled and unlatch when all are disabled

Issue You need to configure an output to latch (activate) when any input from a group is enabled (open), and unlatch (deactivate) when all inputs are disabled (closed). Product Line EcoStruxure Security Expert Environment Security Expert Cause Uncertainty around how to use Security Expert's Area and Output features to achieve this logic. Resolution To implement this logic, use the Ready Output functionality within a dedicated Area. Understanding Ready Output The Ready Output is activated when all inputs (including trouble inputs) in an Area are closed, indicating the Area is ready to be armed. It is deactivated when any input is open or the Area is armed. Configuration Steps Create a Dedicated Area In Security Expert, create a new Area specifically for this input group logic. Assign Inputs to the Area Add the desired Inputs to this Area. Set each Input’s type to "Instant" (or another appropriate type based on your use case). Configure the Ready Output Go to the Areas tab → select your Area → navigate to the Outputs sub-tab. Scroll to the bottom and locate the Ready Output section. Assign the Output you want to control based on the state of the Inputs. Optional: Invert the Output If your Output device requires the opposite logic (i.e., activate when any input is open), go to the Outputs tab → select your Output → check the Invert Output option under the Options sub-tab. Ensure the Area Is Disarmed The Ready Output only functions when the Area is disarmed. If the Area is armed, the Output will not behave as expected.
View full article
Guinan AdamSteele Guinan
‎2025-10-25 07:13 PM

on ‎2025-10-25 07:13 PM

Labels:
  • EcoStruxure Security Expert
145 Views

Commissioning HID Signo OSDP Readers Fails

Issue After commissioning HID Signo OSDP readers in Security Expert, they do not log card events. Readers cannot be brought online in Security Expert. Product Line EcoStruxure Security Expert Environment Security Expert HID Signo Smart Card readers HID Reader Manager App Warning Hazard of Electric Shock: Remove all power from all devices before removing any covers or doors of the system. Disconnect power at the device and at the power source. Electrostatic Discharge Required: Always discharge static electricity from your person by touching metal prior to handling any hardware. Failure to do so may result in damage to devices. Potential for Data Loss: The steps detailed in the resolution of this article may result in a loss of critical data if not performed properly. Before beginning these steps, make sure all important data is backed up in the event of data loss. If you are unsure or unfamiliar with any complex steps detailed in this article, please contact Product Support for assistance. Cause Both sides of the commissioning process require proper installation steps: HID Signo reader configuration using the HID Reader Manager App Security Expert configuration Resolution Confirm Cards Work with Reader Before starting OSDP commissioning: Set the HID Signo reader to Wiegand mode. Connect it to the Security Expert SP-C Reader Expander port. Configure the Reader Expander and Door records for the correct format and credential. Badge a card at the reader and check events in Security Expert to confirm the reader is reading the correct format. Once confirmed, proceed to Commissioning HID Signo OSDP readers.   Commissioning HID Signo OSDP readers involves two main steps: Reader configuration in the HID Reader Manager App Security Expert configuration Step 1: Configure Reader in HID App for OSDP Install Mode Open the HID Reader Manager App. Navigate to: Inspection Report → Detailed Configuration → Communication Protocol Inspect Reader Enable Install Mode:  Scroll down and select Add to Template. Select Apply Selected Items. Enable OSDP Wait for the reader update to complete, then exit the menus. Writing changes Step 2: Configure Reader Expander in Security Expert In Security Expert, go to: Reader Expander → General tab Set Port Network Type to OSDP.  Saving changes creates two new Smart Reader records. Configure the Smart Reader:  Set the Address correctly (1 + the address value set in the HID Reader App). Under the Reader tab, set:  Reader One Format to the correct format. Reader One Door to the correct Door record. Activate OSDP Install Mode:  Right-click the Reader Expander record → Activate OSDP Install Mode. Expected Events Install Mode Activation by <operator> on Module <module> Module <module> Registered With Serial No (####) These indicate the command was processed and the expander attempted to register. Important: These events appear whether the OSDP handshake succeeds or fails. The only way to confirm success is to badge a card and check for events. OSDP Install Mode may need multiple attempts for successful handshaking. When successful, the HID Reader Manager App will automatically disable Install Mode, which can be confirmed in the App. Key Notes Always verify card functionality before starting OSDP commissioning. Multiple attempts may be required for OSDP handshake. Successful commissioning is confirmed by card events in Security Expert.  
View full article
Guinan AdamSteele Guinan
‎2025-10-22 12:18 AM

on ‎2025-10-22 12:18 AM

Labels:
  • EcoStruxure Security Expert
148 Views

How is a subnet defined, and what role does it play in IP networking?

Issue How is a subnet defined, and what role does it play in IP networking? Product Line EcoStruxure Access Expert, EcoStruxure Building Operation, EcoStruxure Security Expert, TAC I/NET Environment This explanation is based on principles outlined in TCP/IP Network Administration by Craig Hunt, published by O’Reilly & Associates, Inc Cause Subnetting is a method used to divide a larger IP network into smaller, more manageable segments called subnets. This segmentation helps optimize IP address usage, improve routing efficiency, and enhance network security and organization. Resolution What Is a Subnet? A subnet (short for subnetwork) is a logical subdivision of an IP network. It is defined by applying a subnet mask to an IP address, which determines how the address is split into: Network portion – identifies the specific network. Host portion – identifies individual devices (hosts) within that network. How Subnet Masks Work A subnet mask is a 32-bit binary pattern that accompanies an IP address. It uses binary values to indicate which part of the IP address refers to the network and which part refers to the host: A bit set to 1 in the subnet mask means the corresponding bit in the IP address is part of the network. A bit set to 0 means the corresponding bit is part of the host. Example IP Address: 192.168.1.10 Subnet Mask: 255.255.255.0 (binary: 11111111.11111111.11111111.00000000 ) CIDR Notation: /24 This means: Network Address: 192.168.1.0 Broadcast Address: 192.168.1.255 Usable Host Range: 192.168.1.1 to 192.168.1.254 CIDR Notation Modern networks often use CIDR (Classless Inter-Domain Routing) notation to define subnets. CIDR expresses the subnet mask as a suffix (e.g., /24 ), indicating the number of bits used for the network portion. Common CIDR Blocks CIDR  Subnet Mask Hosts per Subnet /30 255.255.255.252 2 usable hosts /24 255.255.255.0 254 usable hosts /16 255.255.0.0 65,534 usable hosts Additional Notes Subnets are local constructs: They are meaningful within the internal network and typically not visible to external networks unless explicitly routed. Subnetting supports hierarchical addressing, which simplifies routing tables and improves scalability. Proper subnetting is essential for network performance, security segmentation, and efficient IP address management.
View full article
Picard Product_Support
‎2018-09-06 03:27 PM

Last Updated: Lt. Commander Katha Lt. Commander ‎2025-10-15 02:05 AM

Labels:
  • Andover Continuum
  • EcoStruxure Access Expert
  • EcoStruxure Building Expert
  • EcoStruxure Building Operation
  • EcoStruxure Security Expert
  • Satchwell BAS & Sigma
  • TAC IA Series
  • TAC INET
  • TAC Vista
2138 Views

BMS Redundancy TVDA

Issue How to be redundant with your intelligent Building Management System (iBMS) Product Line Andover Continuum, EcoStruxure Building Operation, Field Devices, Satchwell Sigma, Security Expert, TAC INET Environment Existing intelligent Building Management System Open Mind High Availability Solutions (Deprecated by manufacturer) everRun MX ztC Edge Cause In engineering, redundancy is the duplication of critical components of a system with the intention of increasing the system's reliability. To be redundant with an intelligent Building Management System (iBMS) would take on two possibilities. Have an alarm on critical points alerting personnel who move into action quickly replacing control boards or devices in the event of failure. Have secondary backup controllers which upon failure, which are used to control devices resuming functionality. This is accomplished through programming the BAS with event sequences triggered from alarms or flags noting the failure. Redundancy capabilities and feasibility are site specific. Ascertaining failure in boards, points, or devices is crucial to creating secondary measures to keep seamless processes going and resume with functions.   Error detection and correction with maintenance is often the best practice for preventing failure. Worn components are the leading cause of failure, followed by a lack of planning and consideration in the protection of electrical components through power surges or failures.   For the database, backups including automated backups for MSDE, SQL Express, and Full SQL are available. For further information on database backups and options, take a look at Microsoft SQL Management Studio. For Host Computer backups, look at adding a secondary computer which replicates the database and can capture transactions and messages should a failure with the primary host computer take place. Also work with the local IT department to keep machines up to date, safe, and clean of 3rd party applications which may interfere with integrity. Schneider Electric’s building management systems are designed such that building control continues even when controller to server communication is disrupted. The BMS server is home to a database of alarm and historical data, as well as system parameters and programs. When a server or its network connection fails, the collection of data from building controllers halts until the problem is resolved. For data critical applications, this solution provides an environment capable of preventing the data loss that results from these types of failures.  Although we do support its use with EcoStruxure Building Operation, Security Expert, Continuum, I/NET, Vista, Sigma, and I/A Series as a disaster recovery solution, we do not provide direct support for EverRun. Resolution For Open Mind High Availability Solutions guide please look at the following link; Open Mind High Availability Solution guide For everRun MX solution guide please look at the following link; everRun MX guide For ztC Edge solution guide please look at the following link; ztC Edge guide   
View full article
Picard Product_Support
‎2018-09-06 01:43 PM

Last Updated: Crewman ContentModerator ‎2025-10-15 03:43 AM

Labels:
  • Andover Continuum
  • EcoStruxure Building Operation
  • EcoStruxure Security Expert
  • Field Devices
  • Satchwell BAS & Sigma
  • TAC INET
6604 Views

Security Expert Operator password policies

Issue What is the password policy for Security Expert operators, and how can it be configured to meet specific cybersecurity requirements? Product Line EcoStruxure Security Expert Environment Security Expert Server Security Expert Client Cause Some sites require customized password policies to comply with cybersecurity standards. These may include requirements such as: Enforcing regular password changes Preventing the reuse of previous passwords Setting minimum password length Requiring strong password complexity Resolution   Default Password Policy in Security Expert By default, Security Expert enforces the following password policy for operator accounts: Minimum password length: 8 characters Password change required: On first login For more information on Security Expert’s cybersecurity practices, refer to the SX-SRVR Security Expert System Hardening Reference Guide. Custom Password Policies via Active Directory Integration Security Expert does not support advanced password policy configuration directly within the client interface. However, enhanced password policies can be enforced by integrating Security Expert with Windows Active Directory. To implement this: Integrate Security Expert with Active Directory Follow the steps outlined in Option 1 of the How to Integrate Active Directory with Security Expert article or Option 2 for full Active Directory integration. See AN 288 Security Expert - Using Active Directory - Integration Guide for additional details. Configure Password Policies in Windows Domain Once integration is complete, operator accounts managed through Active Directory will adhere to the domain’s password policy. This allows you to enforce: Password expiration intervals Password history restrictions Minimum and maximum password lengths Complexity requirements (uppercase, lowercase, numbers, symbols)
View full article
Guinan AdamSteele Guinan
‎2025-05-27 06:27 PM

Last Updated: Crewman ContentModerator ‎2025-10-10 02:56 AM

Labels:
  • EcoStruxure Security Expert
518 Views

Where to find commands used in Security Expert objects to implement new functions

Issue Unable to find details on all commands that have been added to Security Expert objects to implement new functionality. Having this information available would help determine feature set possibilities. Product Line Security Expert Environment Security Expert Client, SP-C Cause Commands used in objects such as Controllers, Doors, and Access Levels may not be documented in the online help, installation, or operation manuals as they are being used to implement new functionality that has not been added to the Security Expert yet. There is no stand-alone list of all available Commands. Resolution Commands are listed in the firmware Release Notes and defined further in Application Notes.
View full article
Guinan AdamSteele Guinan
‎2020-07-28 05:08 PM

Last Updated: Crewman ContentModerator ‎2025-09-25 03:28 AM

Labels:
  • EcoStruxure Security Expert
1521 Views

Virtual environments supported for use with Security Expert

Issue What virtual environments are supported for use with Security Expert? Product Line Security Expert Environment Security Expert Microsoft SQL Server Cause Which specific virtualization software has been qualified to work with Security Expert? Resolution No specific virtualization software has been qualified with Security Expert. The Security Expert Compatibility Matrix describes support for Virtual Environments as the following.   The Security Expert server is supported on Virtual Server Environments. However, Schneider Electric reserves the right to request customer replication of any errors in a non-virtual environment. When installing under virtual server environments special care must be taken to ensure that the system requirements are met by the virtualized hardware. The VM must be carefully reviewed with regard to resource and performance before completing any installation.
View full article
Picard Product_Support
‎2018-09-10 09:42 AM

Last Updated: Crewman ContentModerator ‎2025-09-25 03:23 AM

Labels:
  • EcoStruxure Security Expert
2651 Views

Suprema Fingerprint Reader Integration

Issue Suprema Fingerprint Reader Integration Product Line EcoStruxure Security Expert Environment Security Expert Suprema Fingerprint Reader Cause Security Expert integrates with Suprema BioEntry, BioEntry Plus, and FaceStation devices. Enrolment is both quick and easy with users scanning their fingerprint or face at an enrolment reader. The Suprema reader uses the scanned data to create a credential template, including a card number, which it sends to the Security Expert Server. Security Expert then sends this template to any other Suprema readers that are attached to the system so that only one enrolment is required. Resolution The following information is available on integrating Suprema Fingerprint Readers with Security Expert A list of qualified Suprema devices and configuration details can be found in the Suprema Biometric Integration in Security Expert Application Note. There are some available help topics in the online help. In the Security Expert  Client go to ABOUT | HELP and search for "Biometric Readers" and "Suprema". Each Suprema reader requires a wiegand port on a controller / expander, a license (SX-BIO-SP) and an IP address. The amount of Suprema readers allowed is only limited by these numbers. 
View full article
Picard Product_Support
‎2018-09-10 10:24 AM

Last Updated: Crewman ContentModerator ‎2025-09-25 03:05 AM

Labels:
  • EcoStruxure Security Expert
3910 Views

Smart Card Reader is not reading cards and LED flashing red/green.

Issue When a card is presented at the Smart Reader it beeps but no card data is sent through to the Security Expert Controller. The Reader LED is flashing red then green every second continuously. Product Line EcoStruxure Security Expert Environment Security Expert Smart Card Readers which support both 125Khz and 13.56Mhz (SX-DRD-xx, SX-DRK-xx, SX-RK-xx) Cause The Smart Card Reader is not able to communicate with the Controller as it is in RS-485 mode but the connection being used is Wiegand. Once connecting to the the Smart Reader in RS-485 mode the reader will not communicate if it is then connected up to a Wiegand port. Resolution Once a Security Expert Smart Card Reader is used in an RS-485 configuration it will not work in Wiegand configuration until it has been re-programmed with a configuration card designed for that purpose. The configuration card  (SX-ISO-CONFIG) must be purchased through Schneider Electric. See the Security Expert Credentials Order Form for details.   This is because RS-485 is a two-way communication, intelligent wiring protocol. Once the reader is set in this two-way communication mode there is currently no way, without the configuration card, to go back to a less intelligent one-way mode like Wiegand.   Note: Readers manufactured in 2017 or before may have a firmware version that uses a configuration mode that will not respond to a configuration card. If you contact Schneider Electric for a configuration card, supply the serial number (SN) from the back of the reader on your request.
View full article
Picard Product_Support
‎2018-09-10 09:31 AM

Last Updated: Crewman ContentModerator ‎2025-09-25 02:59 AM

Labels:
  • EcoStruxure Security Expert
21926 Views

Security Expert supported biometric readers

Issue What fingerprint or faceprint readers does Security Expert support? Product Line EcoStruxure Security Expert Environment Security Expert Fingerprint Reader Faceprint Reader Biometric Reader Cause Require information on what Biometrics readers are supported with Security Expert. Resolution We officially support Suprema, Princeton Identity and IDEMIA biometric readers (see SX SRVR Security Expert - Compatibility Matrix) however our reader expanders/controllers are able to work with any reader that provides a standard 26-bit Wiegand output.   If there is a biometric reader that does this it should be able to be connected to Security Expert like a standard card reader supplying the controller with Wiegand data that is assigned to a user. The enrolling of biometrics would need to be handled by the third party system, we would essentially be treating it as a normal card reader and card.   For a list of Suprema devices that Security Expert supports refer to the Suprema Biometric Integration in Security Expert Application Note. For a list of Princeton Identity devices that Security Expert supports refer to the Princeton Identity Biometric Integration  Application Note. For a list of IDEMIA devices that Security Expert supports refer to the IDEMIA Biometrics Integration Application Note.
View full article
Picard Product_Support
‎2018-09-10 12:47 PM

Last Updated: Crewman ContentModerator ‎2025-09-25 02:58 AM

Labels:
  • EcoStruxure Security Expert
3971 Views

Security Expert PSU has Fault Icon lit and Status Light Flashing Red

Issue Security Expert PSU has Fault Icon lit and Status Light Flashing Red Every 3 Seconds indicating an issue with PSU Addressing Product Line EcoStruxure Security Expert Environment Security Expert PSU Cause The module address 254 is the default value which all modules are shipped with and is outside the range the controller can accept. This must therefore be changed during commissioning. See Page 41 of the Operator Reference Manual for details. There is an overall limit of 250 modules that can be connected to a single controller with the following limit on each type of module: Keypad Modules: 200 Input Expanders: 248 Reader Expanders: 64 Output Expanders: 32 The module addressing is defined per module type not by the position of that module on the network. You could have all modules at the same address as long as they are all different types. Example: With the following modules we could have all modules be set to use address 1: 1 x Controller 1 x Keypad 1 x Reader Expander (In this case onboard Reader) 1 x Analogue Expander (PSU) Resolution 1. Right Click on the SP-C Controller and select Module Addressing. Change the Address of the Analog Expander (PSU) from its default value of 254 in this case to a value of 1. 2. Then Update all Modules. 3. Select the Analog Expander (PSU) in the System and also change its Physical Address to also be 1. Save the changes. 4. The PSU should now come online and the Fault Icon on the PSU will no longer be lit.
View full article
Picard Product_Support
‎2018-09-10 07:49 AM

Last Updated: Crewman ContentModerator ‎2025-09-25 02:58 AM

Labels:
  • EcoStruxure Security Expert
2330 Views

Security Expert Event Service stopping/starting and Controllers going offline/online in the client

Issue Troubleshoot Security Expert Controllers showing offline in the client. Product Line EcoStruxure Security Expert Environment Security Expert Cause Require some common troubleshooting steps to help determine why controllers may be offline to the client. Resolution The main items to check are: Refer to the Troubleshooting Security Expert Controller Connectivity - Application Note on Exchange. If a controller has failed and the Replacement controller unable to be brought online then check if controller encryption had been enabled on the replaced controller. Restart the client software. Power restart the controller. Remove power Wait for all LED's on the controller to go completely off Apply power to the controller. In the controller web interface, on the Settings page, check that Event Server 1 has the correct IP address. Check that the Firewall is disabled. Check any Anti-Virus Firewalls/settings as well. If the Firewall cannot be disabled, ensure that all required ports are open between devices. See SX-SRVR Security Expert - Network Administrators - Installation Guide for details. Restart the Security Expert services under the PC's Services option in Control Panel. These need to be restarted when any changes are made. Confirm that the User Interface, Data Server, Event Server and Download Server module versions are all the same. Go to About  > Version and check there. If the database has not been upgraded to the same version as the client software, then this can cause communications issues. On the Security Expert Server check that MSMQ is installed as this is now a requirement   Security Expert MSMQ is required (Not showing live point status / shows "Unknown Status" error)   If MSMQ was installed after Security Expert, you'd need to reinstall Security Expert to allow it to run correctly. If MSMQ is installed and controllers are still not coming online (or the controllers are "bouncing" offline/online) then anecdotal evidence suggests enabling Windows 8 Compatibility Mode may help especially for Windows Server 2016 and Server 2019. Set the Windows 8 Compatibility Mode checkbox in the Properties page for C:\Program Files (x86)\Schneider Electric\Security Expert\SecurityExpertEvtSvr.exe   Also, note that if a database backup has been imported, then there is a need to check/change some other settings as well to ensure everything is set up for the specific server and controller.   Under Global > Download Server confirm that your computer name is the name of the PC where the download server service is running. Under Global > Event Servers ensure that the computer name is the name of the PC where the event server service is running. Under Sites > Controllers confirm the Serial number, IP Address, Download Port, Download Server and Control and Status Request Port match what is set in the controller's configuration web page (browse to the controllers IP Address to view). On that same General tab go to Diagnostic Windows and open the download and event server windows. Review the information contained and if there are any errors shown. Right click the controller and select Get Health Status. Review the status messages displayed.
View full article
Picard Product_Support
‎2018-09-06 07:36 AM

Last Updated: Crewman ContentModerator ‎2025-09-25 02:58 AM

Labels:
  • EcoStruxure Security Expert
8340 Views

Schlage Integration with Security Expert

Issue Is it possible to integrate Schlage products with Security Expert? Product Line Security Expert Environment Security Expert Server (vv4.2.259.19 and above) SP-C controller Firmware (v2.08.923 and above) Cause Unable to migrate or convert a legacy access control system which has Schlage devices integrated to Security Expert Resolution With Security Expert Software (v4.2.259.19 and above) and SP-C firmware (v2.08.923 and above), the integration of Schlage devices (AD300 and AD400) with Security Expert software is supported.  It is always recommended to use the latest Security Expert Version and SP-C firmware version to avoid any known issues. For more information regarding the, Schlage Integration with Security Expert, download the attachment.  Refer to Security Expert Allegion Smart Reader Integration 
View full article
Commander Sampath_Konda Commander
‎2019-08-28 11:54 AM

Last Updated: Crewman ContentModerator ‎2025-09-25 02:58 AM

Labels:
  • Andover Continuum
  • EcoStruxure Security Expert
  • TAC INET
1695 Views

SP-C-WEB Recommended Limits

Issue SP-C-WEB Recommended Limits Product Line Security Expert Environment Security Expert SP-C-WEB Cause The SP-C-WEB limitations are mentioned in briefly in the SmartX Controller SP-C-WEB presentation but detailed information on this is not available in the current SP-C-WEB documentation.  Resolution Schneider Electric's recommended limits for the SP-C-WEB:Number of Areas: 32 Number of Doors: 32 Number of Aperio Doors: 0 Number of Sallis Doors: 0 Number of Allegion Doors: 0 Number of Credential Readers: 0 Number of Cameras: 2 Number of Elevators: 0 Number of Floors: 0 Number of Inputs: 512 Number of Keypads: 32 Number of Outputs: 512 Number of Input Expanders: 32 Number of Output Expanders: 32 Number of Reader Expanders: 32 Number of Analog Expanders: 32 Number of Users: 10000 Number of Areas: 32 Number of Doors: 32 Number of Aperio Doors: 0 Number of Sallis Doors: 0 Number of Allegion Doors: 0 Number of Credential Readers: 0 Number of Cameras: 2 Number of Elevators: 0 Number of Floors: 0 Number of Inputs: 512 Number of Keypads: 32 Number of Outputs: 512 Number of Input Expanders: 32 Number of Output Expanders: 32 Number of Reader Expanders: 32 Number of Analog Expanders: 32 Number of Users: 10000
View full article
Picard Product_Support
‎2018-09-10 07:59 AM

Last Updated: Crewman ContentModerator ‎2025-09-25 02:57 AM

Labels:
  • EcoStruxure Security Expert
2419 Views

OTIS Elevator HLI integration with Security Expert

Issue How to interface OTIS Elevator HLI with Security Expert. Product Line Security Expert Environment Security Expert v4.2.194.7 or higher SX-ELV-HLI-OT license to enable the integration OTIS OTIS Compass V2 OTIS OTIS Compass V3 Cause Information required on how to interface OTIS Elevator HLI with Security Expert. Resolution Requirements Security Expert (v4.2.194.7 or higher). SX-ELV-HLI-OT license to enable the integration.   This interface will work with OTIS Compass V2 and OTIS Compass V3. Detailed information on how to configure this integration can be found in the application note below.   Security Expert OTIS HLI Integration
View full article
Picard Product_Support
‎2018-09-10 10:13 AM

Last Updated: Crewman ContentModerator ‎2025-09-25 02:53 AM

Labels:
  • EcoStruxure Security Expert
2594 Views
  • « Previous
    • 1
    • 2
    • 3
    • …
    • 18
  • Next »
To The Top!

Forums

  • APC UPS Data Center Backup Solutions
  • EcoStruxure IT
  • EcoStruxure Geo SCADA Expert
  • Metering & Power Quality
  • Schneider Electric Wiser

Knowledge Center

Events & webinars

Ideas

Blogs

Get Started

  • Ask the Community
  • Community Guidelines
  • Community User Guide
  • How-To & Best Practice
  • Experts Leaderboard
  • Contact Support

    Ask our Experts

    Have a question related to our products, solutions or services? Get quick support on community Forums

    Email Us

    For Community platform-related support, please email us

Brand-Logo
Subscribing is a smart move!
You can subscribe to this board after you log in or create your free account.
Forum-Icon

Create your free account or log in to subscribe to the board - and gain access to more than 10,000+ support articles along with insights from experts and peers.

Register today for FREE

Register Now

Already have an account? Login

Terms & Conditions Privacy Notice Change your Cookie Settings © 2025 Schneider Electric

Welcome!

Welcome to your new personalized space.

of

Explore