Home > ADT Security Services > Home Security > ADT Security Services Simon XT User Manual

ADT Security Services Simon XT User Manual

    Download as PDF Print this page Share this page

    Have a look at the manual ADT Security Services Simon XT User Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 68 ADT Security Services manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    							g
    Simon XT
    User Manual 
    						
    							  
    CopyrightCopyright © 2007 GE Security. All rights reserved. 
    This document may not be copied in whole or in part or otherwise reproduced without prior 
    written consent from GE Security except where specif ically permitted under US and 
    international copyright law. 
    Document number/ 466-2266B (March 2007). 
    DisclaimerThe information in this document is subject to change without notice. GE Security
    , Inc. 
    (“GE Security”) assumes no responsibility for inaccuracies or omissions and specif ically 
    disclaims any liabilities, losses, or risks, personal or otherwise, incurred as a consequence, 
    directly or indirectly, of the use or application of any of the contents of this document . For the 
    latest documentation, contact your local supplier or visit us online at www.gesecurity.com.   
    This publication may contain examples of screen captures and reports used in daily operations. 
    Examples may include f ictitious names of individuals and companies. Any similarity to names 
    and addresses of actual businesses or persons is entirely coincidental. 
    Trademarks and patentsGE and the GE monogram are registered trademarks of General Electric Company.  
    Simon XT product and logo are registered trademarks of GE Security. 
    Other trade names used in this document may be trademarks or registered trademarks of the 
    manufacturers or vendors of the respective products. 
    This product and the use of this product may be covered by one or more of the following 
    patents: 5,805,063, 5,872,512, 5,942,981, 5,686,896, 5,686,885, 4,855,713. Except expressly 
    provided herein, the purchase of this product shall not constitute a license or otherwise provide 
    a right to practice a method covered by any of the identif ied patents. GE Security hereby grants 
    the purchaser of this product a limited, nonexclusive license to practice the methods patented 
    in the identif ied patents solely with products manufactured, sold or licensed by GE Security. 
    This license grant does not extend to the use of unlicensed, third party products with this 
    product .
    Software license agreement Important: This end-user license agreement (“Agreement”) is a legal agreement between 
    GE SECURITY and You. Read the following terms and conditions carefully before installing or 
    using this Software. This agreement provides a license from GE SECURITY to use the Software. It 
    also contains warranty information, disclaimers, and liability limitations. Installing and/or using 
    the Software conf irms Your agreement to be bound by these terms and conditions. If You do not 
    agree with these terms and conditions, do not install or use the Software or, if already installed, 
    immediately cease all use of the Software and promptly uninstall all components of the 
    Software. 
    1. Def initions. The following def initions apply to this document:
    a. “GE SECURITY”, with respect to title to or warranty of the Software, means GE Security 
    Inc., a Delaware corporation. 
    b. “Software” means the executable software or f irmware programs and accompanying 
    documentation installed on the GE SECURITY products, plus any upgrades, modif ied 
    versions, updates, additions, and copies of the software furnished to Customer during 
    the term of the license granted herein. 
    c. “Documentation” means all associated media, printed materials, and electronic docu
    -mentation accompanying the Software. 
    d. “Licensed Product” means the Software and Documentation. 
    e. “Customer ” means the person or organization, or parent or subsidiary thereof, who 
    uses the Software for its intended purposes, and excludes distributors, authorized 
    resellers, value-added resellers and original equipment manufacturers. Customer may 
    be referred to as You or Your, whether an individual or a business entity of any kind. 
    f. “Machine” means the computer, workstation, terminal, or other hardware product on 
    which the Software is installed.  
    						
    							iii
    2. License. All rights to and in the Licensed Product , including, but not limited to, copyrights, 
    patents, trademarks, and trade secrets, belong to GE SECURITY, and GE SECURITY retains title 
    to each copy of the Software. You agree that GE SECURITY at any time, upon reasonable 
    notice, may audit Your use of the Software for compliance with the terms and conditions of 
    this Agreement . Subject to the terms and conditions of this Agreement , GE SECURITY grants 
    You a nonexclusive license to use the Software, but only in the country where acquired, 
    provided that You agree to the following:
    You may:
    a. install and use the Software on a single Machine at one time, unless You have purchased 
    additional copies of the Software, in which case You may install the software on the 
    number of Machines for which You have purchased copies of the Software; 
    b. use the original copy of the Software provided to You for backup purposes. 
    You may not:
    a. transfer or distribute the Licensed Product to others, in electronic format or otherwise, and 
    this Agreement shall automatically terminate in the event of such a transfer or distribution; 
    b. use the Software over a computer network; 
    c. sell, rent , lease, or sublicense the Software; 
    d. copy or modify the Licensed Product for any purpose, including for backup purposes. 
    3. Term. This Agreement is effective until terminated. You may terminate this Agreement by 
    uninstalling all components of the Software from all Machines and returning the Software to 
    GE SECURITY. GE SECURITY may terminate this Agreement if You breach any of these terms 
    and conditions. Upon termination of this Agreement for any reason, You agree to uninstall all 
    components of the Software and return the Licensed Product to GE SECURITY. All provisions 
    of this Agreement relating to (i) disclaimer of warranties; (ii) limitations on liability, remedies, 
    and damages; and (iii) GE SECURITY’s proprietary rights, shall survive termination of this 
    Agreement .
    4. Object code. The Software is delivered in object code only. You may not alter, merge, 
    modify, adapt , or translate the Software, nor decompile, disassemble, reverse-engineer, or 
    otherwise reduce the Software to a human-perceivable form, nor create derivative works or 
    programs based on the Software.
    5. Limited warranty. GE SECURITY warrants that for one (1) year from the date of delivery of 
    the Licensed Product (Software Warranty Period), the functions contained in the Software 
    will be f it for their intended purpose as described in the applicable Documentation from 
    GE SECURITY, and will conform in all material respects to the specif ications stated in such 
    Documentation. GE SECURITY does not warrant that the operation of the Software will be 
    uninterrupted or error-free. GE SECURITY does warrant that the media on which the 
    Software is furnished will be free from defects in materials and workmanship under normal 
    use for a period of thirty (30) days from the date of delivery (Media Warranty Period). Except 
    as specif ically provided therein, any other software and any hardware furnished with or 
    accompanying the Software is not warranted by GE SECURITY. 
    Your exclusive remedy under this limited warranty for nonconforming Software shall be 
    repair or replacement of the Software, at the sole discretion of GE SECURITY. To obtain a 
    repair or replacement of nonconforming Software, contact GE SECURITY Customer Service 
    toll-free at 888-GESECURity or online at www.gesecurity.com during the Software Warranty 
    Period. 
    Except as expressly provided above, the licensed product is provided “as is” without 
    warranty of any kind, either expressed or implied, including, but not limited to, implied 
    warranties of merchantability or f itness for a particular purpose and, except as expressly 
    provided above, You assume the entire risk as to the quality and performance of the licensed 
    product .  
    						
    							Simon XT
    User Manual iv
    6. Limitation of liability. GE SECURITY’s sole obligation or liability under this agreement is 
    the repair or replacement of nonconforming software and/or defective media according to 
    the limited warranty above. In no event will GE SECURITY be liable for damages, whether 
    consequential, incidental, or indirect , nor for loss of data, loss of profits, or lost savings, 
    arising from use or inability to use the software or documentation (or any hardware 
    furnished with the software), even if GE SECURITY has been advised of the possibility of such 
    damages, nor for any claim by any third party. 
    7. General. Any materials provided to You by GE SECURITY shall not be exported or 
    reexported in violation of any export provisions of the USA or any other applicable 
    jurisdiction. Any attempt to sublicense, assign, or transfer any of the rights, duties, or 
    obligations hereunder shall be void. This Agreement shall be governed by and interpreted 
    under the laws of the State of New York, United States of America, without regard to conflicts 
    of law provisions. You hereby consent to the exclusive jurisdiction of the state and federal 
    courts located in Multnomah County, Oregon, to resolve any disputes arising under or in 
    connection with this Agreement , with venue in Portland, Oregon. 
    8. Restricted rights legend. The Licensed Product is provided with RESTRICTED RIGHTS. In 
    the event the United States Government or an agency thereof is granted a license, the 
    following additional terms apply: Restricted Computer Software, as def ined in the 
    Commercial Computer Software–Restricted Rights clause at Federal Acquisition Regulations 
    52.227-19, and the restrictions as provided in subparagraphs (c)(1) and (c)(2) thereof; and as 
    applicable, the Government’s rights to use, modify, reproduce, release, perform, display, or 
    disclose the Software also are restricted as provided by paragraphs (b)(2) and (b)(3) of the 
    Rights in Noncommercial Technical Data and Computer Software–Small Business Innovative 
    Research (SBIR) Program clause at DFARS 252.227-7018.
    9. Acknowledgment . You acknowledge that You have read and understand this agreement 
    and agree to be bound by its terms. You further agree that this agreement is the complete 
    and exclusive statement of the agreement between You and GE SECURITY, and supersedes 
    any proposal or prior agreement , oral or written, and any other communication relating to 
    the subject matter of this agreement . 
    Intended useUse this product only for the purpose it was designed for; refer to the data sheet and user 
    documentation. For the latest product information, contact your local supplier or visit us online 
    at www.gesecurity.com. 
    FCC complianceChanges or modif ications not expressly approved by GE Security can void the user ’s authority 
    to operate the equipment .
    FCC Part 15 Class B
    This equipment has been tested and found to comply with the limits for a Class B digital device, 
    pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection 
    against interference in a residential installation.
    This equipment generates, uses, and can radiate radio frequency energy and, if not installed 
    and used in accordance with the instructions, may cause harmful interference to radio 
    communications. However, there is no guarantee that interference will not occur in a particular 
    installation.
    If this equipment does cause harmful interference to radio or television reception, which can be 
    determined by turning the equipment off and on, the user is encouraged to try to correct the 
    interference by one or more of the following measures:
    Reorient or relocate the receiving antenna.
    Increase the separation between the equipment and receiver.
    Connect the affected equipment and the panel receiver to separate outlets, on different branch 
    circuits.
    Consult the dealer or an experienced radio/TV technician for help. 
    						
    							v
     
    ACTA Part 68
    This equipment complies with Part 68 of the FCC Rules. Located on this equipment is a label that 
    contains, among other information, the FCC registration number and the ringer equivalence 
    number (REN) for this equipment . If requested, this information must be provided to the 
    telephone company.
    FCC Part 68 Registration No. US:B4ZAL02B55910
    The REN is used to determine the maximum number of devices that may be connected to your 
    telephone line. Excessive RENs on a telephone line may result in devices not ringing in response 
    to an incoming call. In most areas, the sum of all device RENs should not exceed f ive (5.0). To be 
    certain of the number of devices that may be connected to a line, as determined by the total 
    RENs, contact the local telephone company. For products approved after July 23, 2001, the REN 
    for this product is part of the product identif ier that has the format US:AAAEQ##TXXXX. The 
    digits represented by ## are the REN without a decimal point (e.g., 03 is a REN of 0.3). For earlier 
    products, the REN is separately shown on the label.
    A plug and jack used to connect this equipment to the premises wiring and telephone network 
    must comply with the applicable FCC Part 68 rules and requirements as adopted by ACTA. A 
    compliant telephone cord and modular plug is provided with this product . It is designed to be 
    connected to a compliant modular jack that is also compliant . See the Installation Instructions 
    for details.
    Alarm dialing equipment must be able to seize the telephone line and place a call in an 
    emergency situation. It must be able to do this even if other equipment (telephone, answering 
    system, computer modem, etc.) already has the telephone line in use. To do so, alarm dialing 
    equipment must be connected to a properly installed RJ31X jack that is electrically in series and 
    ahead of all other equipment attached to the same telephone line. If you have any questions 
    concerning these instructions, consult your local telephone company or a qualif ied installer 
    about installing an RJ31X jack and alarm dialing equipment for you.
    If this equipment causes harm to the telephone network, the telephone company may 
    temporarily disconnect your service. If possible, you will be notif ied in advance. When advance 
    notice is not practical, you will be notif ied as soon as possible. You will also be advised of your 
    right to f ile a complaint with the FCC.
    The telephone company may make changes in its facilities, equipment , operations, or 
    procedures that could affect the operation of the equipment . You will be given advance notice 
    in order to maintain uninterrupted service.
    If you experience trouble with this equipment , please contact the company that installed the 
    equipment for service and/or repair information. The telephone company may ask you to 
    disconnect this equipment from the network until the problem has been corrected or you are 
    sure that the equipment is not malfunctioning.
    This equipment may not be used on coin service provided by the telephone company. 
    Connection to party lines is subject to state tariffs. 
    						
    							vii
    Contents
    Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ix
    Conventions used in this document. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .ix
    Safety terms and symbols  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .ix
    Chapter 1.   Introduction  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
    Security system components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
    Communicating with your system  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
    Chapter 2.   Using the control panel  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
    Panel controls. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
    Standard text display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
    Simon XT features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
    Things you can do . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
    Home security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
    Exit/entry delay  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11
    Bypassing sensors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
    Alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
    Light control (optional) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
    Chimes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
    Latchkey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
    System status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
    Using an offsite phone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
    Using touchpads  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
    Remote handheld touchpad. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
    Keyfob touchpad . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
    Chapter 3.   How your system communicates  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
    Status beeps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
    Alarm sirens and lamp modules  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
    Panel indicator lights  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
    Trouble beeps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
    Chapter 4.   Programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .23
    System menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
    Entering and exiting the system menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
    Code options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
    Menu navigation  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
    Set clock  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
    Light schedules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
    Sensor lights  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
    Chime . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
    Special chime  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28 
    						
    							Simon XT
    User Manual viii
    System tests  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
    System programming  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
    Revision . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
    Contrast  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
    Chapter 5.   Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37
    Testing sensors  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
    Testing communication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
    Appendix A.   Reference information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .41
    Alarm system limitations  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
    Emergency planning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
    Smoke and heat detector locations  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
    Your floorplan. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
    Sensor and module locations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
    Access codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
    Delays  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
    Index  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .49 
    						
    							ix
    Preface
    This is the GE Simon XT User Manual. This document includes an overview of the product and detailed 
    instructions on how to operate the system.
    Read these instructions and all ancillary documentation entirely before operating this product. The most 
    current versions of this and related documentation may be found on our online publication library. To access 
    the library, go to our website at the following location: 
    http://www.gesecurity.com
    In the Customer Support menu, select the Resource Library link. After you register and log on, you may 
    search through our online library for the documentation you need.
    1 
    Conventions used in this document
    The following conventions are used in this document: 
    Safety terms and symbols
    These terms may appear in this manual: 
    1. Many GE documents are provided as PDFs (portable document format). To read these documents, you will need Adobe 
    Reader, which can be downloaded free from Adobe’s website at www.adobe.com.  BoldMenu items and buttons. 
    ItalicEmphasis of an instruction or point; special terms.
    File names, path names, windows, panes, tabs, f ields, variables, and other GUI elements. 
    T itles of books and various documents. 
    Blue italic(Electronic version.) Hyperlinks to cross-references, related topics, and URL addresses. 
    Monospace  Text that displays on the computer screen. 
    Programming or coding sequences. 
    CAUTION:  Cautions identify conditions or practices that may result in damage to the equipment or other property.  
    WARNING:  Warnings identify conditions or practices that could result in equipment damage or serious personal injury. 
    						
    All ADT Security Services manuals Comments (0)

    Related Manuals for ADT Security Services Simon XT User Manual