> If necessary, select individual media from the left-hand column for which you would
like to view event logs. Click All entries in the bottom left if you would once again
like to view all locking components for a specific area.
> Enter a minimum of three characters in the search field for a targeted search.
> Set filters, such as "Not authorised" . This will list entries where access was denied.
> Sort the list by date and time .
> Use the Go to field in the bottom right to quickly browse to a certain day in an
extensive list.
> Use the "Export" button in the bottom left if you would like to export the entire
media event log to a CSV file. You can then process this export regardless of the
AirKey Online Administration.
All required information, such as date and time, user (user ID), media ID (designation), door
designation (additional information), component ID and the corresponding event are listed
within the event log. The "Details" column lists additional information on the particular
event.
The "Source" column shows whether the event log entry was generated by a medium and/or
a locking component.
Use event log settings to restrict the logging of personal data in event log entries according
to data protection legislation. You specify the type of personal data in event logs saved for
locking components you add throughout the access control system in the Settings or in the
locking component details of each locking component.
You can also view event log entries for specific media in the dedicated media section. For
this purpose, select the desired medium from the media list and go to the Event log tab.
Events where the access is denied are saved only if the medium has an
authorisation for the locking component, but the authorisation was not valid
at the time of the access attempt (e.g. the authorisation has expired or is
valid in the future).
The battery status shown in the "Details" column does not always correspond to the locking
component’s (cylinder) actual battery status and the smartphone’s battery status.
If event logs for locking components are restricted to a certain period, access events conti-
nue to be recorded after said period. In this case, the personal data is rendered anonymous.
Within the context of locking component and media event log entries relating to persons
may also be rendered anonymous retrospectively for reasons of data protection. Any event
log entries critical to data protection, such as access events, are shown in the first column
with a recycling bin icon.
Proceed as follows to render personal data in event log entries anonymous: