Arming and disarming your security system using your computer or mobile device. Bypassing zones and understanding results of an alarm event.