You can find out which entities and access points are affected by a given access rule, using the Access rule configuration report.
What you should know
In the report results, you can see the members of the access rule, such as the cardholders, doors, and the associated schedule. This helps you determine if you must add or remove entities, or adjust the schedule.
For information about modifying the members of an access rule, see the Security Center Administrator Guide.