EasyManua.ls Logo

HIKVISION DS-K1T802M - Page 128

HIKVISION DS-K1T802M
135 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Access Control Terminal·User Manual
120
Purpose:
The Access Control Configuration Log files include Access Control devices log
files. Access Control Configuration of the Access Control System can be
operated as adding, modifying and deleting door groups or doors and access
control device permission operations.
Steps:
1. Open the Log Search page.
2. Select the radio button of Configuration Logs.
3. Select the operation type as Access Control Configuration.
4. Click the icon to specify the start time and end time.
5. Click Search. The matched log files will display on the list.
You can check the operation time, log type and other information of the
logs.
Please narrow the search condition if there are too many log files.
Searching Downloading Permission Logs
Purpose:
The Downloading Permission Log files include downloading permission log files,
and no record for downloading permission failure log files.
Steps:
1. Open the Log Search page.
2. Select the radio button of Configuration Logs.
3. Select the operation type as Downloading Permission.
4. Click the icon to specify the start time and end time.
5. Click Search. The matched log files will display on the list.
You can check the operation time, log type and other information of the
logs.
Please narrow the search condition if there are too many log files.
Searching System Configuration Logs
Purpose:
The System Configuration Log files of the Access Control System can be
searched as system configuration interface log files.
Steps:
1. Open the Log Search page.
2. Select the radio button of Configuration Logs.
3. Select the operation type as System Configuration Logs.

Related product manuals