Video Surveillance Commissioning / Install Checklist

Author: Ethan Ace, Published on Feb 08, 2016

This 60+ point checklist helps end users, integrators and consultants verify that video surveillance installation is complete.

It covers the following sections:

  • Camera Physical Setup
  • Camera View Setup
  • Camera Network / Security settings
  • Camera Configuration Changes
  • VMS Hardware
  • VMS Security
  • VMS General Settings
  • Workstation Setup
  • Network Setup
  • Cable Verification

**** **+ ***** ********* ***** *** *****, *********** *** *********** verify **** ***** ************ ************ ** ********.

** ****** *** ********* ********:

  • ****** ******** *****
  • ****** **** *****
  • ****** ******* / ******** ********
  • ****** ************* *******
  • *** ********
  • *** ********
  • *** ******* ********
  • *********** *****
  • ******* *****
  • ***** ************

[***************]

Download *** *** ***** ********

********:

*********: ** ********* **** ****** ***** **** ********* *** **** for ***** *** ***** / **********. ***** ** ** '*** size **** ***' ********* *** **** **** ** ***** ** serve ** * ******** ***** ** **** ** ****** *** quicker ** ***** **** ***.

******

**** ******* ****** ************* ** ******* (** *** *********), ********* mounting *** ******** **************, ***/***** ******* ********, *** *******/******** *****.

********

  • ******* ******* *** ***** ********* *** ******
  • ************ ******* ****** (*** **************** ************ ******)
  • ***** ****, ****, ***/** ******* ***** ********
  • ***** ******* (** ********)

****** **** *****

  • *** *** ***** ****** (***** **** ***/** ****** **** *****; see *********** ********** **** ********* ********* ********)
  • **** ***/**** ***** ******** (*** ****** **, ** **** ***, etc.)
  • ****** ******** ******** ** ******* ***** ** ****
  • **** ***** ******** (***** ***** **** ********, *.*., *** ****** off ********, ** ******** ****** ***** ********)
  • ****** ******** ********* *********** ***** ******** **************/************; *** ********** *** ***** ** ***** ************* ****** ****** / ******* ************ *****
  • **** ***** ***** ******** ** ******* (**** ** *******/****** ** east/west ****** *******, ******** *** ******* **** *** ** **** direct, ***.); *** ****** ********
  • ****** ******** ***/***** ***** *********** ***** ******** **************/************

*******/******** ********

************* *******

**** **** **** ** ***** ********, **** ** **********, *********, compression, ****** *********, ***., *** ** ********** ** *** ***, though **** ****** ********* ** *** ******/*** *********** ****. ******** features **** ** ***, ***** **, *********, *** ***** ****** are ****** ******** *** *** *** *** **** ** ********** through *** ****** *** *********.

***/*********

**** ******* ****** ************* ** *** ******* *** ****/****, ********* both ********/******* ***** ** **** ** ** *** ********. **** of ***** ***** *** *** ** **** ********* ** ** and *** ********. *** *******, ******** ********* ********* ** *** require ** *******.

********/********

******* ********

  • ****** ********/********* ** ****** *******
  • ****** ***** ******** **** *******
  • ****** ********/**** ******
  • *** *** ****** *** ****** **** *** ****
  • ********* ******* ******* (******** ******, ***, ***)
  • ********* ******* ****** (******* ********* ******)
  • ********* ********* ******** (*.*., **/*, ***-***, ***-*****, ********, ***.)

************

**** **** ******** ****** ************, ********* ********, **, *** *** client ***** *** *************. **** ** ***** ***** *** ** omitted ** ***** ******* ** ******** ********* ** ****.

  • ******** *** *******(**) ** **** ***********
  • ****** *** ******** ** *******(**)
  • ***** ****** ** ******* (****** *** *********** ** ************)
  • ****** ****** ***** ********
  • ****** ********** ***** ** *********
  • ******* *** ****** *** ****** ** ****** *******
  • ********* ****** ***** ** ********; *** ****** **** ***** ********
  • ********* **** *****/********* ** ********
  • ********* *** ***** ** *********; *** ****** ******* ********
  • ********* *****/***** ***** ** ********
  • **** *** ********* *** ******* (** ********)

*******

**** ******* ******** ************* ** ******* ********, ********* ********, *******, firewalls, ***. **** ** ***** ******* *** *** ** **** in *** *******, ** ******* ** *** ********** **********.

*******

**** ******* ****** ************* ** *** ************ ******* ******, ********* labeling, ********, ********* ********, *** *******. *** ********** ******* *** ***** ************ ******** ******* ** ***** ****** *** ****.

  • ***** *** ******, ***** ******, **** *******, ***., ** ********* (see ******** ********* **** *********)
  • ****** ****** *** ******* ** ******** (*-*****, ******* *****, ***.)
  • ******* ****** ***** ********/********
  • ***** ******** ****** *** ******* ******* ***** ** ****** ******** and **** *** ** ********;
  • **** *** ************ *** ******** ******* ** ********* (*** ********** ***** ******* *****)
  • ******** ***** **** ******* ** ********* (** ************* ** ********)

Comments (23)

This is a great document, thanks

Very helpful starting/ reference, must have info for every VMS specification set.

Thank you IPVM!

Chris Daniels, HAWA Incorporated

In the past we had line items for techs to write down ip and credential info for each camera. since moving to in-house instead of on-site programming that all happens on the build bench, but simply having that info months after the install is a boon to serviceability. The next step for us is saving a copy of the VMS config file and storing it for future service restore, etc and even remote service on the fly. The checklist is a critical first step though. nice job!

Nice points list. Thanks

Great reference. This is why i don't mind paying dues!!!

When you assign the network address, it would be good to gather all serial numbers from the products. It makes returns and repairs easier AND it can handle a dispute where the customer purchased materials and added to the system from another source which involves warranty support.

As a comment, I had a dealer who arrived at a site and several of his cameras went missing. He replaced them and when someone returned, there were additional cameras of the same type added by the customer. Now, who wants to call a customer a thief....but a little proof would have gone a long way.

Excellent point and I can't believe I left that out.

Thanks for the suggestions, we'll update this this week.

I thank you for building this list, I'm going to make an Excel sheet out of it!

You missed one of the most imporant thing: backup configuration of VMS/NVR/DVR which contains not only camera configurtion but user permissions, priviliges, schedules, etc.

Thanks for pointing that out! It was actually in there but things got moved around and it got lost in the shuffle. I'll get it back in.

This reads as if this is an "AS-BUILT" document as opposed to an installation plan.

I believe you have forgot the following

1) make and model of the cameras, NVR's, and servers

2) VMS software version

3) License information

Thanks

Any idea of when the document might be ready??

this is nice but I wonder if there already is a Excel document available ?

Still eagerly anticipating the word/excel documents!!

Sorry about the delay on the excel document, I dropped the ball on this. I just queued this up with our graphics person. I am not exactly sure the best way to lay this out but we will do a version and then share with you all for feedback.

thanks !

May I ask what is the purpose of document the MAC address?

In my experience it depends on the customer, sometimes the IT staff will require it, for example if they are running port security. Regardless its still a good idea to make a note of it.

It's like documenting a hidden junction box in a remodel, you only know you need it when you really need it. If you document anything, document everything.

It can help IT department to locate network issues. Better to have on-hand than going out to the site, climb to the ladder to read it or check it on a workstation (if available).

What about DDNS, static ip ,port that opened

also, if it's a take over job, or upgrading very important to document and photograph , existing condition of systems before any new work starting, soon as you touch the system the costumer can blame you for pre-existing issues that you didn't plann to repair

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Camera Course January 2019 on Jan 23, 2019
This is the only independent surveillance camera course, based on in-depth product and technology testing. Lots of manufacturer training exists...
Bosch Favorability Results 2019 on Jan 23, 2019
Bosch's favorability moderately strengthed, in new IPVM integrator statistics over their results from 2017, with 2019 results showing strong net...
Intersec 2019 Show Report on Jan 23, 2019
The 2019 Intersec show, held annually in Dubai, is now complete. IPVM attended for 3 days, interviewing numerous Chinese and Western video...
Milesight Company Profile on Jan 22, 2019
Milesight Technology, a Chinese company building an International branded business, says they are slowly building their presence through a series...
Cable Trenching for Surveillance on Jan 21, 2019
Trenching cable for surveillance is surprisingly complex. While using shovels, picks, and hoes is not advanced technology, the proper planning,...
Milestone Favorability Results 2019 on Jan 21, 2019
Milestone's favorability moderately strengthed, in new IPVM integrator statistics over their results from 2016. While the industry has been...
The IP Camera Lock-In Trend: Meraki and Verkada on Jan 18, 2019
Open systems and interoperability have become core features of video surveillance systems, as virtually all professional IP cameras integrate with...
Mobile Surveillance Trailers Guide on Jan 17, 2019
Putting cameras in a place for temporary surveillance where power and communications are not readily available can be complicated and expensive....
Testing Bandwidth Vs. Low Light on Jan 16, 2019
Nighttime bandwidth spikes are a major concern in video surveillance. Many calculate bandwidth as a single 24/7 number, but bit rates vary...
Access Control Records Maintenance Guide on Jan 16, 2019
Weeding out old entries, turning off unused credentials, and updating who carries which credentials is as important as to maintaining security as...

Most Recent Industry Reports

Testing Bandwidth vs. Frame Rate on Jan 23, 2019
Selecting frame rate has a major impact on surveillance bandwidth and storage consumption. But with smart codecs now common and cameras more...
Camera Course January 2019 on Jan 23, 2019
This is the only independent surveillance camera course, based on in-depth product and technology testing. Lots of manufacturer training exists...
Bosch Favorability Results 2019 on Jan 23, 2019
Bosch's favorability moderately strengthed, in new IPVM integrator statistics over their results from 2017, with 2019 results showing strong net...
Intersec 2019 Show Report on Jan 23, 2019
The 2019 Intersec show, held annually in Dubai, is now complete. IPVM attended for 3 days, interviewing numerous Chinese and Western video...
2019 Camera Book Released on Jan 22, 2019
This is the best, most comprehensive security camera training in the world, based on our unprecedented testing. Now, all IPVM PRO Members can get...
Milesight Company Profile on Jan 22, 2019
Milesight Technology, a Chinese company building an International branded business, says they are slowly building their presence through a series...
Cable Trenching for Surveillance on Jan 21, 2019
Trenching cable for surveillance is surprisingly complex. While using shovels, picks, and hoes is not advanced technology, the proper planning,...
Milestone Favorability Results 2019 on Jan 21, 2019
Milestone's favorability moderately strengthed, in new IPVM integrator statistics over their results from 2016. While the industry has been...
The IP Camera Lock-In Trend: Meraki and Verkada on Jan 18, 2019
Open systems and interoperability have become core features of video surveillance systems, as virtually all professional IP cameras integrate with...
NYPD Refutes False SCMP Hikvision Story on Jan 18, 2019
The NYPD has refuted the SCMP Hikvision story, the Voice of America has reported. On January 11, 2018, the SCMP alleged that the NYPD was using...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact