Video Surveillance Commissioning / Install Checklist

Author: Ethan Ace, Published on Feb 08, 2016

This 60+ point checklist helps end users, integrators and consultants verify that video surveillance installation is complete.

It covers the following sections:

  • Camera Physical Setup
  • Camera View Setup
  • Camera Network / Security settings
  • Camera Configuration Changes
  • VMS Hardware
  • VMS Security
  • VMS General Settings
  • Workstation Setup
  • Network Setup
  • Cable Verification

**** **+ ***** ********* ***** *** *****, *********** *** *********** verify **** ***** ************ ************ ** ********.

** ****** *** ********* ********:

  • ****** ******** *****
  • ****** **** *****
  • ****** ******* / ******** ********
  • ****** ************* *******
  • *** ********
  • *** ********
  • *** ******* ********
  • *********** *****
  • ******* *****
  • ***** ************

[***************]

Download *** *** ***** ********

********:

*********: ** ********* **** ****** ***** **** ********* *** **** for ***** *** ***** / **********. ***** ** ** '*** size **** ***' ********* *** **** **** ** ***** ** serve ** * ******** ***** ** **** ** ****** *** quicker ** ***** **** ***.

******

**** ******* ****** ************* ** ******* (** *** *********), ********* mounting *** ******** **************, ***/***** ******* ********, *** *******/******** *****.

********

  • ******* ******* *** ***** ********* *** ******
  • ************ ******* ****** (*** **************** ************ ******)
  • ***** ****, ****, ***/** ******* ***** ********
  • ***** ******* (** ********)

****** **** *****

  • *** *** ***** ****** (***** **** ***/** ****** **** *****; see *********** ********** **** ********* ********* ********)
  • **** ***/**** ***** ******** (*** ****** **, ** **** ***, etc.)
  • ****** ******** ******** ** ******* ***** ** ****
  • **** ***** ******** (***** ***** **** ********, *.*., *** ****** off ********, ** ******** ****** ***** ********)
  • ****** ******** ********* *********** ***** ******** **************/************; *** ********** *** ***** ** ***** ************* ****** ****** / ******* ************ *****
  • **** ***** ***** ******** ** ******* (**** ** *******/****** ** east/west ****** *******, ******** *** ******* **** *** ** **** direct, ***.); *** ****** ********
  • ****** ******** ***/***** ***** *********** ***** ******** **************/************

*******/******** ********

************* *******

**** **** **** ** ***** ********, **** ** **********, *********, compression, ****** *********, ***., *** ** ********** ** *** ***, though **** ****** ********* ** *** ******/*** *********** ****. ******** features **** ** ***, ***** **, *********, *** ***** ****** are ****** ******** *** *** *** *** **** ** ********** through *** ****** *** *********.

***/*********

**** ******* ****** ************* ** *** ******* *** ****/****, ********* both ********/******* ***** ** **** ** ** *** ********. **** of ***** ***** *** *** ** **** ********* ** ** and *** ********. *** *******, ******** ********* ********* ** *** require ** *******.

********/********

******* ********

  • ****** ********/********* ** ****** *******
  • ****** ***** ******** **** *******
  • ****** ********/**** ******
  • *** *** ****** *** ****** **** *** ****
  • ********* ******* ******* (******** ******, ***, ***)
  • ********* ******* ****** (******* ********* ******)
  • ********* ********* ******** (*.*., **/*, ***-***, ***-*****, ********, ***.)

************

**** **** ******** ****** ************, ********* ********, **, *** *** client ***** *** *************. **** ** ***** ***** *** ** omitted ** ***** ******* ** ******** ********* ** ****.

  • ******** *** *******(**) ** **** ***********
  • ****** *** ******** ** *******(**)
  • ***** ****** ** ******* (****** *** *********** ** ************)
  • ****** ****** ***** ********
  • ****** ********** ***** ** *********
  • ******* *** ****** *** ****** ** ****** *******
  • ********* ****** ***** ** ********; *** ****** **** ***** ********
  • ********* **** *****/********* ** ********
  • ********* *** ***** ** *********; *** ****** ******* ********
  • ********* *****/***** ***** ** ********
  • **** *** ********* *** ******* (** ********)

*******

**** ******* ******** ************* ** ******* ********, ********* ********, *******, firewalls, ***. **** ** ***** ******* *** *** ** **** in *** *******, ** ******* ** *** ********** **********.

*******

**** ******* ****** ************* ** *** ************ ******* ******, ********* labeling, ********, ********* ********, *** *******. *** ********** ******* *** ***** ************ ******** ******* ** ***** ****** *** ****.

  • ***** *** ******, ***** ******, **** *******, ***., ** ********* (see ******** ********* **** *********)
  • ****** ****** *** ******* ** ******** (*-*****, ******* *****, ***.)
  • ******* ****** ***** ********/********
  • ***** ******** ****** *** ******* ******* ***** ** ****** ******** and **** *** ** ********;
  • **** *** ************ *** ******** ******* ** ********* (*** ********** ***** ******* *****)
  • ******** ***** **** ******* ** ********* (** ************* ** ********)

Comments (23)

This is a great document, thanks

Very helpful starting/ reference, must have info for every VMS specification set.

Thank you IPVM!

Chris Daniels, HAWA Incorporated

In the past we had line items for techs to write down ip and credential info for each camera. since moving to in-house instead of on-site programming that all happens on the build bench, but simply having that info months after the install is a boon to serviceability. The next step for us is saving a copy of the VMS config file and storing it for future service restore, etc and even remote service on the fly. The checklist is a critical first step though. nice job!

Nice points list. Thanks

Great reference. This is why i don't mind paying dues!!!

When you assign the network address, it would be good to gather all serial numbers from the products. It makes returns and repairs easier AND it can handle a dispute where the customer purchased materials and added to the system from another source which involves warranty support.

As a comment, I had a dealer who arrived at a site and several of his cameras went missing. He replaced them and when someone returned, there were additional cameras of the same type added by the customer. Now, who wants to call a customer a thief....but a little proof would have gone a long way.

Excellent point and I can't believe I left that out.

Thanks for the suggestions, we'll update this this week.

I thank you for building this list, I'm going to make an Excel sheet out of it!

You missed one of the most imporant thing: backup configuration of VMS/NVR/DVR which contains not only camera configurtion but user permissions, priviliges, schedules, etc.

Thanks for pointing that out! It was actually in there but things got moved around and it got lost in the shuffle. I'll get it back in.

This reads as if this is an "AS-BUILT" document as opposed to an installation plan.

I believe you have forgot the following

1) make and model of the cameras, NVR's, and servers

2) VMS software version

3) License information

Thanks

Any idea of when the document might be ready??

this is nice but I wonder if there already is a Excel document available ?

Still eagerly anticipating the word/excel documents!!

Sorry about the delay on the excel document, I dropped the ball on this. I just queued this up with our graphics person. I am not exactly sure the best way to lay this out but we will do a version and then share with you all for feedback.

thanks !

May I ask what is the purpose of document the MAC address?

In my experience it depends on the customer, sometimes the IT staff will require it, for example if they are running port security. Regardless its still a good idea to make a note of it.

It's like documenting a hidden junction box in a remodel, you only know you need it when you really need it. If you document anything, document everything.

It can help IT department to locate network issues. Better to have on-hand than going out to the site, climb to the ladder to read it or check it on a workstation (if available).

What about DDNS, static ip ,port that opened

also, if it's a take over job, or upgrading very important to document and photograph , existing condition of systems before any new work starting, soon as you touch the system the costumer can blame you for pre-existing issues that you didn't plann to repair

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Last Day Save $50 - May 2018 Camera Course on Apr 26, 2018
Today is the last day to save $50 on early registration. Register now (save $50) for the Spring 2018 Camera Course This is the only independent...
Digifort VMS Profile on Apr 25, 2018
Digifort, a Brazilian company, has a strong presense in their home country. In a crowded and mature Enterprise VMS market, will they be able to...
Milestone 2017 Financials Examined on Apr 24, 2018
For ISC West 2018, Milestone released ... their financials, touting "strong revenue growth in 2017". However, there were discrepancies with the...
Global Real-Time Video Surveillance - EarthNow on Apr 20, 2018
A new company, EarthNow, with backing from Bill Gates, Airbus and more, is claiming that: Users will be able to see places on Earth with a delay...
April 2018 IP Networking Course on Apr 19, 2018
This is the last chance to register for our IP Networking course. Register now. NEW - 2 sessions per class, 'day' and 'night' to give you double...
Rare Video Surveillance Fundraising - Verkada $15 Million on Apr 19, 2018
Fundraising in video surveillance (and the broader physical security market) has been poor recently. Highlights are few and far in between...
'Best In Show' Fails on Apr 19, 2018
ISC West's "Best In Show" has failed. For more than a decade, it has become increasingly irrelevant as the selections exhibit a cartoon level...
Worst Access Control 2018 on Apr 18, 2018
Three access control providers stood out as providing the most problems for integrators. In this report, we analyze the answers to: "In the...
Axis VMD4 Analytics Tested on Apr 17, 2018
Axis is now on its 4th generation of video motion detection (VMD), which Axis calls "a free video analytics application." In this generation, Axis...
Key Control For Access Control Tutorial on Apr 16, 2018
End users spend thousands on advanced systems to keep themselves secure, but regularly neglect one of the lest expensive yet most important aspects...

Most Recent Industry Reports

May 2018 Camera Course on Apr 25, 2018
Save $50 on early registration until this Thursday, the 26th. Register now (save $50) for the Spring 2018 Camera Course This is the only...
Death Of A Dummy Camera Manufacturer on Apr 25, 2018
5 years ago, IPVM gathered insights from a dummy camera manufacturer, who was then the top selling dummy camera provider on Amazon and 3rd in all...
Hikvision Critical Cloud Vulnerability Disclosed on Apr 25, 2018
Security researchers Vangelis Stykas and George Lavdanis discovered a vulnerability in Hikvision's HikConnect cloud service that: just by...
The Yolo Bro And The Death of Journalism on Apr 24, 2018
There's an old quote: The job of the newspaper is to comfort the afflicted and afflict the comfortable Unfortunately, the opposite is more...
DMP Adds Ring Video Doorbell Integration on Apr 24, 2018
Video doorbells have become one of the hottest items for security systems. After several years with no doorbell, DMP has announced integration with...
Milestone 2017 Financials Examined on Apr 24, 2018
For ISC West 2018, Milestone released ... their financials, touting "strong revenue growth in 2017". However, there were discrepancies with the...
Chinese Manufacturer Kickstarter Campaign Huge Success (EverCam) on Apr 23, 2018
In a week, a Chinese manufacturer's expertly done Kickstarter campaign has received $1.4 million in pledges, an incredible amount for a video...
Favorite Biometrics 2018 on Apr 23, 2018
Biometrics are on the rise, or at least integrator opposition to them is declining, according to new IPVM integrator statistics.   Almost half of...
Dahua and Hikvision Win Over $1 Billion In Government-Backed Projects In Xinjiang on Apr 23, 2018
Dahua and Hikvision have won well over $1 billion worth of government-backed surveillance projects in China’s restive Xinjiang province since 2016,...
Global Real-Time Video Surveillance - EarthNow on Apr 20, 2018
A new company, EarthNow, with backing from Bill Gates, Airbus and more, is claiming that: Users will be able to see places on Earth with a delay...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact