Operating instructions
Chapter
7
RFID Access Management
8018582/2015-11-03
Operating instructions| SICK
87
Subject to change without notice
Working with RFID Access
Management
Sorting the list
You can sort the list of access logs by column by clicking one of the column headings.
Clicking repeatedly on a column heading allows you to switch between ascending and
descending order.
Restricting the list
The two fields above the table allow the list of access logs to be restricted. The filters can
also be combined.
Use the
search field
if you wish to restrict the access logs to a single participant in order
to analyze its access behavior.
Enter the name or the personnel number.
Use the drop-down menu if you wish to focus on access events at selected access
points.
In the list, select the access points that you wish to view.
Resetting
filters
Click the
Reset Filters
icon to delete the applied filters. The list will then contain all the
recorded access logs again.
7.4.3
Closing the access control display
The
Access Log
view does not allow direct navigation to other program areas. The view
must first be closed via the
Logout
icon.
Logging out as Information Security Officer
You have logged in to RFID Access Management with the
Information Security Officer
user role.
Click the
Logout
icon. The System Overview opens.