Event Catalog
YourSixOS keeps users informed with real-time email and push notifications for security events, access activity, system health issues, and tampering alerts—helping customers and integrators stay aware and responsive. Below is a list of selectable events for each category.
Security Events
Events related to physical security threats include detections such as motion, audio, or the identification of persons or vehicles
Event Domain | Description |
---|---|
Audio | Sound detected |
AXIS Object Analytics | AXIS Object Analytics has triggered |
Fence guard | AXIS Fence Guard has triggered |
Loitering guard | AXIS Loitering Guard has triggered |
Motion guard | AXIS Motion Guard has triggered |
Passive infrared | Passive Infrared has triggered |
Perimeter defender | AXIS Perimeter Defender has triggered |
Peripheral activated | A device's pheripherals have been activated |
Radar motion | Radar motion has triggered |
Video motion detection | AXIS Video Motion Detection has triggered |
Access Control Events
Events related to access control
Event Domain | Description |
---|---|
Barrier access denied | Access was denied at barrier |
Barrier access granted | Access was granted at barrier |
Barrier alarm | Alarm at barrier (Open too long, forced open, etc) |
Barrier alarm end | End of barrier alarm |
Barrier control accessed | Temporary access was granted to barrier via matrix live controls in YourSixOS |
Barrier control locked | Barrier mode changed to locked via matrix live controls in YourSixOS |
Barrier control unlocked | Barrier mode changed to unlocked via matrix live controls in YourSixOS |
Health Events
Events related to the health of the solution and its hardware
Additional notes on Proactive Health Monitoring
Event Domain | Description |
---|---|
AXIS Image Health | Image quality is degraded (blurred or under-exposed) or camera has been tampered with (blocked or redirected) |
AXIS Image Health end | End of AXIS image health alarm |
CPU overutilization | CPU was overutilized Recommendation: Reduce number of applications running on the device |
CPU overutilization end | End of CPU overutilization alarm |
Device connected | Device connected |
Device disconnected | Device disconnected. Alert sent once device is offline for 5 minutes |
Network packet loss | Data packets traveling across network failed to reach destination |
Network packet loss end | End of network packet loss alarm |
RAM overutilization | Random Access Memory (RAM) was used beyond its capacity or optimal performance limits Recommendation: Reduce number of applications running on the device |
RAM overutilization end | End of RAM overutilization alarm |
Storage disruption | Device storage was disrupted |
Storage full | Storage full |
Storage full end | End of storage full alarm |
Storage healthy | Strorage is in a healthy state (End of storage disruption alert) |
Temperature warning | Device temperature threashold exceeded |
Temperature warning end | End of temperature warning alarm |
Tampering Events
Events related to possible tampering of the solution’s physical components
Event Domain | Description |
---|---|
Casing opened | Device casing has been opened |
Shock detection | Device detected mechanical shock |
Tilt detection | Device detected mechanical tilt |
Video Tampering | Device detected video tampering |