Fingerprint Time Attendance Terminal
107
The One-card Configuration Log files include departments, persons and cards log
files. One-card Configuration of the Access Control System can be operated as
adding ,modifying and deleting logs.
Steps:
1.
Open the Log Search page.
2.
Select the radio button of Configuration Logs.
3.
Select the operation type as One-card Configuration.
4.
Click the icon to specify the start time and end time.
5.
Click
Search
. The matched log files will display on the list.
You can check the operation time, log type and other information of the logs.
Note:
Please narrow the search condition if there are too many log files.
Searching Access Control Configuration Logs
Purpose:
The Access Control Configuration Log files include Access Control devices log files.
Access Control Configuration of the Access Control System can be operated as
adding, modifying and deleting door groups or doors and access control device
permission operations.
Steps:
1.
Open the Log Search page.
2.
Select the radio button of Configuration Logs.
3.
Select the operation type as Access Control Configuration.
4.
Click the icon to specify the start time and end time.
5.
Click
Search
. The matched log files will display on the list.
You can check the operation time, log type and other information of the logs.
Note:
Please narrow the search condition if there are too many log files.
Searching Downloading Permission Logs
Purpose:
The Downloading Permission Log files include downloading permission log files, and
no record for downloading permission failure log files.
Steps:
1.
Open the Log Search page.
2.
Select the radio button of Configuration Logs.
3.
Select the operation type as Downloading Permission.
4.
Click the icon to specify the start time and end time.
5.
Click
Search
. The matched log files will display on the list.
You can check the operation time, log type and other information of the logs.
Note:
Please narrow the search condition if there are too many log files.
Searching System Configuration Logs
Purpose:
The System Configuration Log files of the Access Control System can be searched as
system configuration interface log files.
Steps:
1.
Open the Log Search page.
2.
Select the radio button of Configuration Logs.