Select from the menu to monitor door activity. Up to 500 of the most recent events will be displayed, along with new events as they happen.
The events are listed in the bottom pane, whilst the details of the last monitored user are displayed in the top pane.
Events can be filtered according to event type using the following options:
| Menu | Displays |
| Show users as they swipe tags (event types U and A) | |
| Show anti-passback infringements (event types B and P) | |
| Show controller status (event types R and S) | |
| Show doors left open (requires a door contact to be set up for anti-passback) (event type O) | |
| Show controller messages (event types E and M) |
Whilst Access Manager is running events can be monitored via Jabber.
Log management, including export of the log file for analysis, can be done by selecting from the menu. The log can be exported, deleted, or both. Both export and deletion are carried out over the time period selected in the Time Period box.
When creating filenames Access Manager uses the ISO8601 standard for timedates. In this international standard dates and times can be combined as follows:
YYYYMMDDTHHMM
YYYY is the four digit year. MM is the month, DD is the day of the month, HH is the hour (24 hour format), and MM is the minutes past the hour. The letter T is used to separate the date from the time. Examples are given below:
| 20061225T1330 | Half past one in the afternoon on the 25th of December 2006 |
| 20070102T0815 | A quarter past eight in the morning on the 2nd of January 2007 |
The main benefit of this system to you is that providing Windows Explorer is set to sort filenames alphabetically, the files will appear in the Explorer window in the order in which they were created. A secondary benefit is that the ISO8601 standard is international, so files can be sent anywhere in the world without any worries about month names being different, or the ordering of the numbers being different.
The maximum log file size is set in the Options.
This will export a time period and then delete from the log the records covering this period.
*This symbol
will be displayed when a schedule is active. Only one schedule can be active at a time.
This allows more control over what gets exported and/or deleted by modifying the SQL
Access Manager uses. Minor modifications to the SQL (such as changing the timestamps) are
reasonably straightforward for anyone familiar with SQL, but in general it is recommended
you ask your supplier for SQL statements that meet your requirements. A good starting
point is to select the closest preset option to your requirement, and then select ¤ Edit SQL in the SQL box. If you
wish to save your SQL, then press the
button, and edit the title New
Settings 0 as
required.
The Copy and Paste buttons allow you to copy and paste both Export and Delete SQL simultaneously. The two statements should be separated by a semicolon, with the Delete SQL following the Export SQL.
The custom SQL is very powerful and can potentially corrupt your database. Consequently you must enter a password just above the SQL immediately prior to execution. This is the password you used to log in to the database in the first place.
Events are classified both in the monitor window and the file log as follows
| Type | Description |
| T | Tag presentation a user has requested access |
| U | Access attempt denied (tag not authorised) |
| A | Access attempt allowed (tag authorised) |
| B | Access attempt denied (passback violation detected) |
| P | Access attempt allowed (tag authorised, but passback violation detected) |
| R | The door controller has reset (the most likely cause being a power failure) |
| S | Status information (eg door unlocked) |
| O | Door open warning. A door is considered open if its anti-tailback contact input is inactive. |
| M | Message. These report system activity, but they are not errors. For example, one controller message simply reports that the controller has been updated successfully. Since a particular sequence of messages may be symptomatic of a problem, you may be asked to report controller messages if you request technical support. |
| E | Error message. An error message shouldn't automatically be a cause for concern, but a constant stream of error messages, especially if repetitive, should be investigated. Note that the fault may not be with whatever is reporting a problem. |