Checking in new visitors - Security Center 5.6

Security Center User Guide 5.6

series
Security Center 5.6
revised_modified
2019-10-09

To ensure that a visitor’s activities can be monitored throughout their visit, you must check in visitors, using the Visitor management task.

Before you begin

Access rules cannot be directly associated to visitors. Therefore, to grant access rights to a visitor, you must create a cardholder group that is reserved for visitors in Config Tool, and assign access rules to the group. Create the cardholder group.

Procedure

  1. From the home page, open the Visitor management task.
  2. Click Check-in ().
  3. At the top of the dialog box, enter the visitor’s first name, last name, and e-mail address.
  4. To assign a picture to the visitor, click the silhouette and select one of the following options:
    Load from file
    Select a picture from disk. All standard image formats are supported.
    Load from webcam
    Take a snapshot with your webcam. This option appears only if you have a webcam attached to your workstation.
    Load from camera
    Take a snapshot from a camera managed by Security Center. When you click Load from camera, a separate capture dialog box opens. Select the video source, and click Take snapshot ().
    Load from clipboard
    Load the picture copied to the clipboard. This option appears only if you used the Windows copy command to save a picture onto your clipboard.
  5. To edit the picture, click it to open the Image editor and use the editing options at the top of the editor’s dialog box.
  6. In the Status section, set the following:
    NOTE: The Activation time is not the same as the check-in time. Activation time indicates when the visitor’s credentials are activated. Check-in time indicates when the visitor profile was created. You can set the activation time to a date in the future, which allows you to create visitor profiles in advance.
    Status
    Set the their status to Active or Inactive. For their credential to work, and for them have access to any area, their status must be Active.
    Activation
    If their status is currently set to Inactive, set a date and time to activate their profile.
    Expiration
    Set an expiration for their profile:
    Never
    Never expires.
    Specific date
    Expires on a specific date and time.
    Set expiration on first use
    Expires after a specified number of days after the first use.
    When not used
    Expires when it has not been used for a specified number of days.
  7. Assign a credential to the visitor so that their movement can be tracked in the system.
    NOTE: You can assign a credential now or later.
  8. Assign the visitor to a cardholder group.
    Cardholder groups defines which access rules apply to the visitor.
    1. To assign the first cardholder group, click the Cardholder group drop-down list and select a cardholder group.
      NOTE: Only cardholder groups configured for visitors appear in this list. A visitor can belong to more than one cardholder group.
    2. To assign additional cardholder groups, click Advanced (), then click Add and item ( ). In the dialog box that appears, select the cardholder groups, and click OK.
  9. Enter the visitor’s e-mail address.
  10. (Optional) Assign a host (or an escort) to the visitor, as follows:
    1. Click the Visitor host drop-down list and select a cardholder or a cardholder group as the visitor’s host.
    2. Select the option Escort required if the visitor is not allowed to access certain areas unless their escort also present their credential after them within a certain delay.
  11. (Optional) If custom fields are defined for visitors, enter the additional visitor information.
  12. (Optional) In the Advanced section, configure the following visitor properties:
    NOTE: Some of these properties can be inherited from the parent cardholder groups. When a specific value is configured for the visitor, click Revert to inherited value () to inherit the property from the parent cardholder groups. If multiple parent groups exist, the most privileged value is inherited.
    1. If the visitor has been assigned a credential, grant access privileges to the visitor.
      Use extended grant time
      Grants them more time to pass through doors where the Extended grant time parameter is configured for a door. Use this option for those with reduced mobility.
      Bypass antipassback rules
      Exempts them from all antipassback restrictions.
    2. In the Security clearance field, enter the visitor’s security clearance level. The security clearance level determines their access to areas when a threat level is set in Security Center. Level 0 is the highest clearance level, with the most privileges.
    3. In the Entity name field, type a new name for the visitor entity, if you do not want to use the visitor’s first and last name.
      By default, the Entity name uses the First name and Last name fields.
    4. (Optional) In the Description field, type a description for the visitor.
    5. Assign the visitor to a partition.
      Partitions determine which Security Center users have access to this entity. Only accepted users of the partition can view or modify the visitor.
  13. Click Save.