Event Catalog
YourSixOS keeps users informed with real-time email and push notifications for security events, access activity, system health issues, and tampering alerts—helping customers and integrators stay aware and responsive. Below is a list of selectable events for each category.
Security Events
Events related to physical security threats include detections such as motion, audio, or the identification of persons or vehicles
Event | Description |
---|---|
Audio | Sound detected |
AXIS Object Analytics | AXIS Object Analytics has triggered |
Fence guard | AXIS Fence Guard has triggered |
Loitering guard | AXIS Loitering Guard has triggered |
Motion guard | AXIS Motion Guard has triggered |
Passive infrared | Passive Infrared has triggered |
Perimeter defender | AXIS Perimeter Defender has triggered |
Peripheral activated | A device's peripherals have been activated |
Radar motion | Radar motion has triggered |
Video motion detection | AXIS Video Motion Detection has triggered |
Access Control Events
Events related to access control
Event | Description | Ending Event |
---|---|---|
Barrier access denied | Access was denied at barrier | |
Barrier access granted | Access was granted at barrier | |
Barrier alarm | Alarm at barrier (Open too long, forced open, etc) | Barrier alarm end |
Barrier control accessed | Temporary access was granted to barrier via matrix live controls in YourSixOS | |
Barrier control locked | Barrier mode changed to locked via matrix live controls in YourSixOS | |
Barrier control unlocked | Barrier mode changed to unlocked via matrix live controls in YourSixOS |
Health Events
Events related to the health of the solution and its hardware
Additional notes on Proactive Health Monitoring
Event | Description | Remediation Recommendations | Ending Event |
---|---|---|---|
AXIS Image Health | Image quality is degraded (blurred or under-exposed) or camera has been tampered with (blocked or redirected) | Physically inspect the device to ensure sensor is not blocked Additional recommendations | AXIS Image Health end |
CPU overutilization | CPU was overutilized | Reduce number of applications running on the device Additional recommendations | CPU overutilization end |
Device disconnected | Device disconnected. Alert sent once device is offline for 5 minutes | Check device power and network connectivity sources Additional recommendations | Device connected |
Network packet loss | Data packets traveling across network failed to reach destination. The system uses CRC (Cyclic Redundancy Check) to spot packet loss. | Recommended remediation steps | Network packet loss end |
RAM overutilization | Random Access Memory (RAM) was used beyond its capacity or optimal performance limits | Reduce number of applications running on the device Additional recommendations | RAM overutilization end |
Storage disruption | Edge (SD card/NAS) storage was disrupted | Storage healthy | |
Storage full | Storage full Threshold: Triggers an alert when storage reaches 90% of total capacity | Storage full end | |
Temperature warning | Device temperature threshold exceeded | Recommended remediation steps | Temperature warning end |
Tampering Events
Events related to possible tampering of the solution’s physical components
Event | Description |
---|---|
Casing opened | Device casing has been opened |
Shock detection | Device detected mechanical shock |
Tilt detection | Device detected mechanical tilt |
Video Tampering | Device detected video tampering |