ShadowDevice
Configuring Location Frequency for ShadowDevice
The ShadowDevice offers various location frequency options to cater to different monitoring needs. This guide will walk you through the steps to configure the location frequency of your ShadowDevice and explain the available frequency options. ...
Creating ShadowDevice Protocols for an Entity
Purpose of Hardware Protocols Any enrollee who is assigned hardware should have a protocol assigned to them A hardware protocol allows you to designate automated steps of action to occur when an alarm is triggered for the hardware. The action steps ...
ShadowDevice Device Communication Information
Within the enrollee profile there is a tab titled "Hardware". When hardware is assigned to an enrollee you can view the device communication information from here. ShadowDevice Device Communication Information Navigate to the "Hardware" tab within ...
New Enrollment - ShadowDevice
Creating the Enrollee Profile To create a new enrollee profile: Go to the Enrollees tab from the main navigational menu Next select the +Enrollee button Enrollee Info The 4 step enrollment wizard will open, complete the following steps: Enrollee Info ...
Create a ShadowDevice Schedule
Purpose of Creating a ShadowDevice Schedule A watch schedule should be created anytime that you want to determine if the enrollee is inside or outside of a specific inclusion or exclusion zone. Although the ShadoWatch will report the tracking ...
Unassigning/Deactivating the ShadowDevice
UnAssign Hardware From the Enrollee Search for the desired enrollee by name form the universal search Once on the enrollee profile, select the Hardware>Device tab Select the Actions button>Unassign Device Next, you will be prompted to select an ...
Restart (Reboot) ShadowDevice
To Reboot the ShadowDevice: Hold the button on the front of the device You will feel a vibration, keep holding until you hear a ding sound Release the button. The device will restart itself The ShadowDevice should be rebooted if: It stops reporting ...
ShadowDevice Alarms in Devices Tab
Accessing the Alarms in the Devices Tab To access the alarms, select the devices tab on the main navigational menu Then select the Alarms sub tab Dashboard Features The alarm dashboard gives you an overview of all alarms in any state, for your entity ...
Creating Device Protocols for an Entity
Purpose of Hardware Protocols Any enrollee who is assigned hardware should have a protocol assigned to them A hardware protocol allows you to designate automated steps of action to occur when an alarm is triggered for the hardware. The action steps ...
Assign a ShadowDevice Protocol to an Enrollee
Protocol Assignment Options A Protocol should be assigned to the Enrollee so that someone is notified in the event of an Alarm. You can only see protocols for your entity and any of your sub-entities. Protocols can be assigned to enrollees in one of ...
ShadowDevice Installation
Installation Tools ShadowDevice Bolt Lock washer Instalation tool Loctite . How to install the ShadowDevice Wrap the band around the enrollee's ankle Then thread the strap through the stainless steel buckle, ensuring that the two protruding metal ...
Understanding ShadowDevice Tracking Methods
ShadowDevice Tracking Methods ShadowDevice employs multiple tracking methods to ensure accurate and reliable location data. This article explains how ShadowDevice tracks via GPS, Wi-Fi, and Location-Based Services (LBS), along with the details and ...
Caching and Dumping Locations On The ShadowDevice
Understanding Caching and Dumping Locations Caching Locations: Caching refers to the temporary storage of location data on the device itself when it is unable to send this data to the server in real-time. This situation can arise due to network ...
ShadowDevice Alarm Types
ShadowDevice Alarm Types: A Comprehensive Guide These alarms are categorized into Battery Alarms, Zone Alarms, Communication Alarms, Tamper Alarms, and Other Alarms. Each category serves a specific purpose, alerting users to potential issues or ...