Video Surveillance Commissioning / Install Checklist

Author: Ethan Ace, Published on Feb 08, 2016

This 60+ point checklist helps end users, integrators and consultants verify that video surveillance installation is complete.

It covers the following sections:

  • Camera Physical Setup
  • Camera View Setup
  • Camera Network / Security settings
  • Camera Configuration Changes
  • VMS Hardware
  • VMS Security
  • VMS General Settings
  • Workstation Setup
  • Network Setup
  • Cable Verification

**** **+ ***** ********* ***** *** *****, *********** *** *********** verify **** ***** ************ ************ ** ********.

** ****** *** ********* ********:

  • ****** ******** *****
  • ****** **** *****
  • ****** ******* / ******** ********
  • ****** ************* *******
  • *** ********
  • *** ********
  • *** ******* ********
  • *********** *****
  • ******* *****
  • ***** ************

[***************]

Download *** *** ***** ********

********:

*********: ** ********* **** ****** ***** **** ********* *** **** for ***** *** ***** / **********. ***** ** ** '*** size **** ***' ********* *** **** **** ** ***** ** serve ** * ******** ***** ** **** ** ****** *** quicker ** ***** **** ***.

******

**** ******* ****** ************* ** ******* (** *** *********), ********* mounting *** ******** **************, ***/***** ******* ********, *** *******/******** *****.

********

  • ******* ******* *** ***** ********* *** ******
  • ************ ******* ****** (*** **************** ************ ******)
  • ***** ****, ****, ***/** ******* ***** ********
  • ***** ******* (** ********)

****** **** *****

  • *** *** ***** ****** (***** **** ***/** ****** **** *****; see *********** ********** **** ********* ********* ********)
  • **** ***/**** ***** ******** (*** ****** **, ** **** ***, etc.)
  • ****** ******** ******** ** ******* ***** ** ****
  • **** ***** ******** (***** ***** **** ********, *.*., *** ****** off ********, ** ******** ****** ***** ********)
  • ****** ******** ********* *********** ***** ******** **************/************; *** ********** *** ***** ** ***** ************* ****** ****** / ******* ************ *****
  • **** ***** ***** ******** ** ******* (**** ** *******/****** ** east/west ****** *******, ******** *** ******* **** *** ** **** direct, ***.); *** ****** ********
  • ****** ******** ***/***** ***** *********** ***** ******** **************/************

*******/******** ********

************* *******

**** **** **** ** ***** ********, **** ** **********, *********, compression, ****** *********, ***., *** ** ********** ** *** ***, though **** ****** ********* ** *** ******/*** *********** ****. ******** features **** ** ***, ***** **, *********, *** ***** ****** are ****** ******** *** *** *** *** **** ** ********** through *** ****** *** *********.

***/*********

**** ******* ****** ************* ** *** ******* *** ****/****, ********* both ********/******* ***** ** **** ** ** *** ********. **** of ***** ***** *** *** ** **** ********* ** ** and *** ********. *** *******, ******** ********* ********* ** *** require ** *******.

********/********

******* ********

  • ****** ********/********* ** ****** *******
  • ****** ***** ******** **** *******
  • ****** ********/**** ******
  • *** *** ****** *** ****** **** *** ****
  • ********* ******* ******* (******** ******, ***, ***)
  • ********* ******* ****** (******* ********* ******)
  • ********* ********* ******** (*.*., **/*, ***-***, ***-*****, ********, ***.)

************

**** **** ******** ****** ************, ********* ********, **, *** *** client ***** *** *************. **** ** ***** ***** *** ** omitted ** ***** ******* ** ******** ********* ** ****.

  • ******** *** *******(**) ** **** ***********
  • ****** *** ******** ** *******(**)
  • ***** ****** ** ******* (****** *** *********** ** ************)
  • ****** ****** ***** ********
  • ****** ********** ***** ** *********
  • ******* *** ****** *** ****** ** ****** *******
  • ********* ****** ***** ** ********; *** ****** **** ***** ********
  • ********* **** *****/********* ** ********
  • ********* *** ***** ** *********; *** ****** ******* ********
  • ********* *****/***** ***** ** ********
  • **** *** ********* *** ******* (** ********)

*******

**** ******* ******** ************* ** ******* ********, ********* ********, *******, firewalls, ***. **** ** ***** ******* *** *** ** **** in *** *******, ** ******* ** *** ********** **********.

*******

**** ******* ****** ************* ** *** ************ ******* ******, ********* labeling, ********, ********* ********, *** *******. *** ********** ******* *** ***** ************ ******** ******* ** ***** ****** *** ****.

  • ***** *** ******, ***** ******, **** *******, ***., ** ********* (see ******** ********* **** *********)
  • ****** ****** *** ******* ** ******** (*-*****, ******* *****, ***.)
  • ******* ****** ***** ********/********
  • ***** ******** ****** *** ******* ******* ***** ** ****** ******** and **** *** ** ********;
  • **** *** ************ *** ******** ******* ** ********* (*** ********** ***** ******* *****)
  • ******** ***** **** ******* ** ********* (** ************* ** ********)

Comments (23)

This is a great document, thanks

Very helpful starting/ reference, must have info for every VMS specification set.

Thank you IPVM!

Chris Daniels, HAWA Incorporated

In the past we had line items for techs to write down ip and credential info for each camera. since moving to in-house instead of on-site programming that all happens on the build bench, but simply having that info months after the install is a boon to serviceability. The next step for us is saving a copy of the VMS config file and storing it for future service restore, etc and even remote service on the fly. The checklist is a critical first step though. nice job!

Nice points list. Thanks

Great reference. This is why i don't mind paying dues!!!

When you assign the network address, it would be good to gather all serial numbers from the products. It makes returns and repairs easier AND it can handle a dispute where the customer purchased materials and added to the system from another source which involves warranty support.

As a comment, I had a dealer who arrived at a site and several of his cameras went missing. He replaced them and when someone returned, there were additional cameras of the same type added by the customer. Now, who wants to call a customer a thief....but a little proof would have gone a long way.

Excellent point and I can't believe I left that out.

Thanks for the suggestions, we'll update this this week.

I thank you for building this list, I'm going to make an Excel sheet out of it!

You missed one of the most imporant thing: backup configuration of VMS/NVR/DVR which contains not only camera configurtion but user permissions, priviliges, schedules, etc.

Thanks for pointing that out! It was actually in there but things got moved around and it got lost in the shuffle. I'll get it back in.

This reads as if this is an "AS-BUILT" document as opposed to an installation plan.

I believe you have forgot the following

1) make and model of the cameras, NVR's, and servers

2) VMS software version

3) License information

Thanks

Any idea of when the document might be ready??

this is nice but I wonder if there already is a Excel document available ?

Still eagerly anticipating the word/excel documents!!

Sorry about the delay on the excel document, I dropped the ball on this. I just queued this up with our graphics person. I am not exactly sure the best way to lay this out but we will do a version and then share with you all for feedback.

thanks !

May I ask what is the purpose of document the MAC address?

In my experience it depends on the customer, sometimes the IT staff will require it, for example if they are running port security. Regardless its still a good idea to make a note of it.

It's like documenting a hidden junction box in a remodel, you only know you need it when you really need it. If you document anything, document everything.

It can help IT department to locate network issues. Better to have on-hand than going out to the site, climb to the ladder to read it or check it on a workstation (if available).

What about DDNS, static ip ,port that opened

also, if it's a take over job, or upgrading very important to document and photograph , existing condition of systems before any new work starting, soon as you touch the system the costumer can blame you for pre-existing issues that you didn't plann to repair

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Milestone Disrupts Milestone With Arcules on Nov 19, 2018
Milestone is now competing against... Milestone's own spinout Arcules New IPVM testing shows that Arcules has incorporated a substantial amount of...
Arcules Cloud VMS Tested on Nov 19, 2018
Arcules is a big bet, or as they describe themselves a 'bold company', spun out and backed by Milestone and Canon.  But how good is Arcules cloud...
French Government Threatens School with $1.7M Fine For “Excessive Video Surveillance” on Nov 14, 2018
The French government has notified a high-profile Paris coding academy that it risks a fine of up to 1.5 million euros (about $1.7m) if it...
Directory of Video Intercoms on Nov 13, 2018
Video Intercoms, also known as Video Door-Phones or Video Entry Systems, have been growing in the past decade as more and more IP camera...
Magos Radar Company Profile on Nov 12, 2018
Magos America General Manager Yaron Zussman admits when he first came across Magos, he asked himself: "What's innovative about radar?" Be that as...
Genetec Privacy Protector Tested on Nov 12, 2018
Genetec has built Kiwi Security's Privacy Protector into Security Center, an analytic which anonymizes individuals in cameras' fields of view...
Video Surveillance Hard Drive Size Statistics 2018 on Nov 08, 2018
What is the most common hard drive size for video surveillance? 150+ integrators answered: What size hard drive do you most commonly use? What...
Axis 2N Intercom Tested on Nov 08, 2018
Axis expanded its video intercom business buying Czech-based 2N in 2016. Despite competing against owner Axis' intercoms, 2N recently registered as...
Ubiquiti Protect Video Surveillance Profile on Nov 07, 2018
Ubiquiti has now been in the video surveillance market for 7 years (see our first coverage back in 2011). In that time, the company's revenue has...
Kogniz Silicon Valley AI Startup Profile on Nov 07, 2018
Kogniz is a Silicon Valley company that aims to bring AI analytics to security and surveillance, centering on their own smart cameras: We spoke...

Most Recent Industry Reports

Milestone Disrupts Milestone With Arcules on Nov 19, 2018
Milestone is now competing against... Milestone's own spinout Arcules New IPVM testing shows that Arcules has incorporated a substantial amount of...
Pressure Mounts Against Dahua and Hikvision Xinjiang Business on Nov 19, 2018
Pressure is mounting against Hikvision, Dahua, and other companies operating in Xinjiang as an international outcry brews against the Chinese...
Arcules Cloud VMS Tested on Nov 19, 2018
Arcules is a big bet, or as they describe themselves a 'bold company', spun out and backed by Milestone and Canon.  But how good is Arcules cloud...
'Sticker' Surveillance Camera Developed (CSEM Witness) on Nov 16, 2018
The Swiss Center for Electronics and Microtechnology (CSEM) has announced what it calls the: world’s first fully autonomous camera that can be...
ISC East 2018 Mini-Show Final Report on Nov 16, 2018
This is our second (updated) and final show report from ISC East. ISC East, by its own admission, is not a national or international show, billed...
Facial Detection Tested on Nov 16, 2018
Facial detection and recognition are increasingly offered by video surveillance manufacturers. Facial detection detects faces in an image/video...
Throughtek P2P/Cloud Solution Profile on Nov 15, 2018
Many IoT manufacturers either do not have the capabilities or the interest to develop their own cloud management software for their devices....
ASIS Offering Custom Research For Manufacturers on Nov 15, 2018
Manufacturers often want to know what industry people think about trends and, in particular, the segments and product they offer.  ASIS and its...
Hikvision Silent on "Bad Architectural Practices" Cybersecurity Report on Nov 14, 2018
A 'significant vulnerability was found in Hikvision cameras' by VDOO, a startup cybersecurity specialist. Hikvision has fixed the specific...
French Government Threatens School with $1.7M Fine For “Excessive Video Surveillance” on Nov 14, 2018
The French government has notified a high-profile Paris coding academy that it risks a fine of up to 1.5 million euros (about $1.7m) if it...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact