Monitoring

Visual Monitoring

Select View...Monitor from the menu to monitor door activity. Up to 500 of the most recent events will be displayed, along with new events as they happen.

The events are listed in the bottom pane, whilst the details of the last monitored user are displayed in the top pane.

Events can be filtered according to event type using the following options:

Menu Displays
View...Monitor Users Show users as they swipe tags (event types U and A)
View...Passback Events Show anti-passback infringements (event types B and P)
View...Monitor Status Show controller status (event types R and S)
View...Monitor Doors Left Open Show doors left open (requires a door contact to be set up for anti-passback) (event type O)
View...Monitor Messages Show controller messages (event types E and M)

Remote Monitoring

Whilst Access Manager is running events can be monitored via Jabber.

Log Management

Log management, including export of the log file for analysis, can be done by selecting File...Log Management from the menu. The log can be exported, deleted, or both. Both export and deletion are carried out over the time period selected in the Time Period box.

When creating filenames Access Manager uses the ISO8601 standard for timedates. In this international standard dates and times can be combined as follows:

YYYYMMDDTHHMM

YYYY is the four digit year. MM is the month, DD is the day of the month, HH is the hour (24 hour format), and MM is the minutes past the hour. The letter T is used to separate the date from the time. Examples are given below:

20061225T1330 Half past one in the afternoon on the 25th of December 2006
20070102T0815 A quarter past eight in the morning on the 2nd of January 2007

The main benefit of this system to you is that providing Windows Explorer is set to sort filenames alphabetically, the files will appear in the Explorer window in the order in which they were created. A secondary benefit is that the ISO8601 standard is international, so files can be sent anywhere in the world without any worries about month names being different, or the ordering of the numbers being different.

The maximum log file size is set in the Options.

Simple Log Export

  1. Select the time period you wish to export from the Time Period box.
  2. Select the event types you wish to export from the Export to File box.
  3. Select the time and date format from the Date Format box.
  4. Press the     Execute     button.
  5. Enter a filename when prompted.

Simple Log Deletion

  1. Select  User-Defined Ú in the Delete box.
  2. Select the  Delete  tab.
  3. Select the time period you wish to export from the Time Period box.
  4. Press the     Execute     button.

Log Export and Delete

This will export a time period and then delete from the log the records covering this period.

  1. Select the time period you wish to export from the Time Period box.
  2. Select the event types you wish to export from the Export to File box.
  3. Select the time and date format from the Date Format box.
  4. Select  Automatic Ú in the Delete box.
  5. Press the     Execute     button.
  6. Enter a filename when prompted.

Scheduled Log Management

  1. Press the newsql.gif (188 bytes) button.
  2. Edit the the title  New Settings 0 Ú as required.
  3. Set the Export and Delete settings as required (see above).
  4. Select the  Scheduling  tab.
  5. Select the time period and start time and date in the Time Period box.
  6. Check p Subdivide to divide the exported log into folders (eg a weekly log export will get subdivided by month).
  7. Check p Active to activate the schedule*. Select the file type and enter the the file prefix. The file prefix will be appended with an ISO8601 timestamp.
  8. Press the     Close     button.

alarm.gif (338 bytes)*This symbol will be displayed when a schedule is active. Only one schedule can be active at a time.

Custom Management

This allows more control over what gets exported and/or deleted by modifying the SQL Access Manager uses. Minor modifications to the SQL (such as changing the timestamps) are reasonably straightforward for anyone familiar with SQL, but in general it is recommended you ask your supplier for SQL statements that meet your requirements. A good starting point is to select the closest preset option to your requirement, and then select ¤ Edit SQL in the SQL box. If you wish to save your SQL, then press the newsql.gif (188 bytes) button, and edit the title  New Settings 0 Ú as required.

The Copy and Paste buttons allow you to copy and paste both Export and Delete SQL simultaneously. The two statements should be separated by a semicolon, with the Delete SQL following the Export SQL.

The custom SQL is very powerful and can potentially corrupt your database. Consequently you must enter a password just above the SQL immediately prior to execution. This is the password you used to log in to the database in the first place.

Event Types

Events are classified both in the monitor window and the file log as follows

Type Description
T Tag presentation – a user has requested access
U Access attempt denied (tag not authorised)
A Access attempt allowed (tag authorised)
B Access attempt denied (passback violation detected)
P Access attempt allowed (tag authorised, but passback violation detected)
R The door controller has reset (the most likely cause being a power failure)
S Status information (eg door unlocked)
O Door open warning. A door is considered open if its anti-tailback contact input is inactive.
M Message. These report system activity, but they are not errors. For example, one controller message simply reports that the controller has been updated successfully. Since a particular sequence of messages may be symptomatic of a problem, you may be asked to report controller messages if you request technical support.
E Error message. An error message shouldn't automatically be a cause for concern, but a constant stream of error messages, especially if repetitive, should be investigated. Note that the fault may not be with whatever is reporting a problem.