Installation and Programming Manual
1-4
Event Logging
By itself, the panel has the capability of storing up to 128 significant events, including arming, disarming,
bypassing, alarms, troubles, restorals, and resets. These events are logged in order according to date and time,
and when applicable, according to Zone, Partition, User Code, Keypad, etc. Optional Event Log Expansion
Modules are available to store 512 and 999 events, respectively. When appropriate, such events can be displayed
on an LCD Keypad or uploaded to the alarm company via the Upload/Download software and printed for further
analysis.
Sensor Auto-Testing (Not for UL Installations)
Sensor Auto-Testing provides for the automatic testing of a selected group of up to 16 sensors in the installation at
one (or more) selected times during the day. If all the related sensors are triggered within a selected window of
time, the Auto-Test will be considered successful. The results of the test will be logged in the Event Log, and
reported to the Central Station, if so desired.
Printer Adapter Module (Not for UL Installations)
A printer module, designed to interface between the Pro-24’s 4-wire Expansion Bus and a Centronics-type parallel
printer, will allow for the printing of all significant system events, as they occur, including Access Control activities
(see above) if applicable. Each event will include the date, time, and if applicable, the affected partition and the
user involved.
Bus Adapter Cable (Not for UL Installations)
With the Bus Adapter Cable assembly, a portable IBM
®
-compatible computer may be directly connected to the Pro-
24 and used for local Uploading/Downloading operations.
Program Transfer Module (Not for UL Installations)
The Program Transfer Module is a tiny printed circuit board capable of storing, without the need for power, the
programmed configuration of any Pro-24. Therefore, if desired, one account’s programmed configuration–once
loaded into the Program Transfer Module–can be used as a “template” and taken to another account, where the
stored configuration may be “copied” and subsequently modified.