Identifying which entities are affected by access rules - Security Center 5.12

Security Center Administrator Guide 5.12

Product
Security Center
Content type
Guides > Administrator guides
Version
5.12
Language
English
Last updated
2024-09-13

You can find out which entities and access points are affected by a given access rule, using the Access rule configuration report.

What you should know

In the report results, you can see the members of the access rule, such as the cardholders, doors, and the associated schedule. This helps you determine if you must add or remove entities, or adjust the schedule.

Procedure

  1. From the homepage, open the Access rule configuration task.
  2. Set up the query filters for your report. Choose one or more of the following:
    Access rule
    Select the access rule to investigate.
    Cardholder status
    Select the cardholder status to investigate: Active, Expired, or Inactive.
    Expand cardholder groups
    Turn on to list the members of the affected cardholder groups in the report instead of the cardholder groups themselves.
    Include perimeter entities
    Turn on to include the perimeter entities of the affected areas in the report.
    Type
    Select the entities to investigate: area, cardholder, cardholder group, door, elevator, schedule, visitor.
  3. Click Generate report.
    The entities and access points affected by this access rule are listed in the report pane.