End users

Last modified: Friday February 21, 2025.

Dealing with false or valid alarms can be stressful. It is critical that the end users of your system know how to use it.

Legitimate users entering armed zones is one of the biggest causes of false alarms.

  • Train end users how to arm and disarm the system.
    • You can control who can arm and disarm zones by assigning user roles and system labels. See Manage Protect users.
  • You must assign at least one user as the emergency contact, and train them to handle alarms. See Add an emergency contact to a zone
  • If you use devices to arm and disarm the system, ensure users have the required PIN codes, key cards, or mobile apps.
  • Provide on-site access to arming and disarming instructions.
    • Include information on how to contact users who have access to the Protect mobile app in case of a problem with on-site arming stations or tampering. See Arm and disarm with the mobile app.
  • Provide users with information for any third-party systems.