logo
Language
deutschenglishfrançaisnederlandsitalianodansksvensk
  • Home
  • General safety instructions
    • Product-specific safety instructions
      • Meaning of the text formatting
        • Intended use
          • General
            • Information on data protection
              • IT basic protection
                • What protection requirements do the data processed in the system have?
                  • What IT infrastructure requirements are recommended?
                  • Encryption
                    • Is the data in System 3060 encrypted?
                      • What data is encrypted?
                        • Are the transmission paths via radio, for example, also encrypted?
                        • Working in compliance with data protection regulations (GDPR)
                          • What personal data is stored in the software?
                            • For what purpose is personal data stored in the software?
                              • How long is personal data stored in the software?
                                • Is personal data in the software protected against access by third parties?
                                  • Can the stored data be made available as a copy?
                                    • Can personal data be deleted from the software?
                                  • Range of functions
                                    • System requirements
                                      • Installation
                                        • Run AXM as the administrator
                                          • Updating AXM
                                          • First steps after a new installation
                                            • Best practice: setting up the locking system
                                              • Best practice: Database protection
                                                • Encrypting an internal hard drive with BitLocker
                                                  • Encrypt external hard drive with BitLocker to go
                                                    • Checking Trusted Platform Module (TPM)
                                                      • Verifying BIOS mode
                                                    • Registration
                                                      • The AXM’s structure
                                                        • Sorting and filtering
                                                          • Installation wizards
                                                            • Multiple options, same result
                                                              • Global search
                                                                • Working with AXM more effectively
                                                                  • Tab operation
                                                                    • Hotkeys
                                                                      • Creating additional objects
                                                                    • Organisational structure
                                                                      • Creating authorisation groups
                                                                        • Creating a person group
                                                                          • Creating a schedule
                                                                            • Create time group
                                                                              • Deleting a time group
                                                                                • Deleting schedules
                                                                                  • Creating a time switchover
                                                                                    • Creating and editing public holidays
                                                                                      • Creating and editing public holiday lists
                                                                                        • Creating a location
                                                                                          • Creating a building and assigning it to a location
                                                                                            • Creating an area
                                                                                              • Creating a hashtag
                                                                                              • Persons and identification media
                                                                                                • Creating an identification medium
                                                                                                  • Duplicating an identification medium (including authorisations and settings)
                                                                                                    • Deleting an identification medium
                                                                                                      • Deleting individual identification media in the matrix
                                                                                                        • Deleting multiple identification media using the tab
                                                                                                        • Allowing an identification medium to open twice as long
                                                                                                          • Muting all locking devices for an identification medium
                                                                                                            • Allow accesses to be recorded by identification media (physical access list)
                                                                                                              • Restricting identification medium authorisations to specific times (time group)
                                                                                                                • Activating or deactivating identification medium once at specific times (activation and expiry date)
                                                                                                                  • Handling defective identification media
                                                                                                                    • Re-synchronise (repair)
                                                                                                                      • Resetting and replacing
                                                                                                                        • Delete and replace
                                                                                                                          • Take out of use and leave in database
                                                                                                                            • taking out of use and deleting from the database
                                                                                                                            • Duplicating forgotten identification medium temporarily
                                                                                                                              • Blocking and replacing lost/stolen identification media permanently
                                                                                                                                • Flag and reset returned identification medium (back to inventory)
                                                                                                                                  • Planning and tracking identification medium management tasks
                                                                                                                                    • Noting the issue date
                                                                                                                                      • Planning and logging battery replacement
                                                                                                                                        • Planning and logging return
                                                                                                                                        • Finding the identification medium or locking device again in the matrix
                                                                                                                                          • Exporting identification media as a list
                                                                                                                                            • Viewing an identification medium’s serial number and TID
                                                                                                                                              • Assigning persons to person groups
                                                                                                                                                • Assigning individual persons/identification media to a person group (in transponder window)
                                                                                                                                                  • Assign a number of persons/identification media to person group (in the person group window)
                                                                                                                                                  • Use identification media in multiple locking systems
                                                                                                                                                    • Reuse identification medium in the same project
                                                                                                                                                      • Reusing identification medium in other projects/databases
                                                                                                                                                    • Doors and locking devices
                                                                                                                                                      • Creating a locking device
                                                                                                                                                        • Duplicating the locking device (including authorisations and settings)
                                                                                                                                                          • Delete locking device
                                                                                                                                                            • Deleting an individual locking device using the matrix
                                                                                                                                                              • Deleting several locking devices using the tab
                                                                                                                                                              • Changing locking device type at later stage
                                                                                                                                                                • Handling defective locking devices
                                                                                                                                                                  • Re-synchronise (repair)
                                                                                                                                                                    • Resetting and replacing
                                                                                                                                                                      • Replacing and deleting
                                                                                                                                                                        • Reset
                                                                                                                                                                          • Purge (only reset in database/software reset)
                                                                                                                                                                          • Assigning locking devices to buildings/locations
                                                                                                                                                                            • Moving locking devices to areas
                                                                                                                                                                              • Assigning individual locking devices to a different area (in the locking device window)
                                                                                                                                                                                • Assign multiple locking devices to another area (in the area window)
                                                                                                                                                                                • Limiting authorisations for locking devices to specific times (schedule)
                                                                                                                                                                                  • Engaging and disengaging locking devices automatically with time switchover
                                                                                                                                                                                    • Have accesses logged by locking device (access list)
                                                                                                                                                                                      • Leaving the locking device open for longer, less time or permanently
                                                                                                                                                                                        • Limit locking device read range (close range mode)
                                                                                                                                                                                          • Muting a locking device (for battery warnings and programming)
                                                                                                                                                                                            • Activating and deactivating card readers
                                                                                                                                                                                              • Ignoring activation and expiry date of identification media
                                                                                                                                                                                                • Changing the SmartRelay settings
                                                                                                                                                                                                  • Using internal and external antenna simultaneously
                                                                                                                                                                                                    • Invert outputs
                                                                                                                                                                                                      • Using the serial interface
                                                                                                                                                                                                        • Changing the signalling
                                                                                                                                                                                                        • Planning and tracking locking device management tasks
                                                                                                                                                                                                          • Note installation, replacement or removal date
                                                                                                                                                                                                            • Planning and logging battery replacement
                                                                                                                                                                                                            • Displaying all locking devices in a project
                                                                                                                                                                                                              • Exporting locking devices as a list
                                                                                                                                                                                                              • Permissions
                                                                                                                                                                                                                • Changing individual authorisations (cross)
                                                                                                                                                                                                                  • Changing many authorisations (on identification media and/or locking devices)
                                                                                                                                                                                                                    • Allowing all or blocking all
                                                                                                                                                                                                                      • Authorisation groups
                                                                                                                                                                                                                        • Adding locking devices and identification media to authorisation groups
                                                                                                                                                                                                                          • Adding areas and person groups to authorisation groups
                                                                                                                                                                                                                            • Show all authorisation groups in a project
                                                                                                                                                                                                                              • Exporting authorisation groups as a list
                                                                                                                                                                                                                              • Controlling authorisations in terms of time (schedules)
                                                                                                                                                                                                                                • Adding locking devices to the schedule
                                                                                                                                                                                                                                  • Adding identification medium to time group
                                                                                                                                                                                                                                    • Add area, including locking devices, to a schedule
                                                                                                                                                                                                                                  • Meaning of the authorisation crosses in the matrix
                                                                                                                                                                                                                                  • Locking systems
                                                                                                                                                                                                                                    • Create locking system
                                                                                                                                                                                                                                      • Adding a card configuration
                                                                                                                                                                                                                                        • MIFARE Classic (new/empty card)
                                                                                                                                                                                                                                          • MIFARE Classic (card already used)
                                                                                                                                                                                                                                            • MIFARE DESFire (new/empty card)
                                                                                                                                                                                                                                              • MIFARE DESFire (card already in use)
                                                                                                                                                                                                                                            • Changing locking system password
                                                                                                                                                                                                                                              • Replacing the locking system
                                                                                                                                                                                                                                                • Enabling PIN code keypads
                                                                                                                                                                                                                                                  • Enable cards or transponders
                                                                                                                                                                                                                                                  • Synchronisation: Comparison between locking plan and reality
                                                                                                                                                                                                                                                    • Synchronising the locking device (including reading access list)
                                                                                                                                                                                                                                                      • Display locking device equipment and status
                                                                                                                                                                                                                                                        • Displaying and exporting a locking device’s access list
                                                                                                                                                                                                                                                        • Identifying an unknown locking device
                                                                                                                                                                                                                                                          • Re-setting the locking device
                                                                                                                                                                                                                                                            • Synchronise an identification medium (including importing physical access list)
                                                                                                                                                                                                                                                              • Displaying the transponder battery status
                                                                                                                                                                                                                                                                • Displaying and exporting the physical access list of an identification medium
                                                                                                                                                                                                                                                                • Identifying an unknown ID medium
                                                                                                                                                                                                                                                                  • Resetting the identification medium
                                                                                                                                                                                                                                                                    • Viewing connected/supported programming devices
                                                                                                                                                                                                                                                                    • Your personalised AXM interface
                                                                                                                                                                                                                                                                      • Interchanging (transposing) doors and persons in the matrix
                                                                                                                                                                                                                                                                        • Select columns and rows in the matrix (enable/disable crosshairs)
                                                                                                                                                                                                                                                                          • Click to change authorisations
                                                                                                                                                                                                                                                                            • Showing or hiding information in the matrix
                                                                                                                                                                                                                                                                              • Reading access list/physical access list during synchronisation
                                                                                                                                                                                                                                                                                • Limiting the number of access list entries in the database
                                                                                                                                                                                                                                                                                  • Pinning tabs
                                                                                                                                                                                                                                                                                    • Changing automatic numbering
                                                                                                                                                                                                                                                                                      • Changing the language
                                                                                                                                                                                                                                                                                        • Personalising reports and exports
                                                                                                                                                                                                                                                                                          • Personalising properties for person details
                                                                                                                                                                                                                                                                                            • Hide and show existing fields
                                                                                                                                                                                                                                                                                              • Creating your own fields
                                                                                                                                                                                                                                                                                                • Subsequently modified user-defined fields
                                                                                                                                                                                                                                                                                            • Administrative tasks
                                                                                                                                                                                                                                                                                              • Creating a backup
                                                                                                                                                                                                                                                                                                • Restoring the backup
                                                                                                                                                                                                                                                                                                  • Exporting error logs
                                                                                                                                                                                                                                                                                                    • Displaying version number and licence key for the AXM installed
                                                                                                                                                                                                                                                                                                      • User management
                                                                                                                                                                                                                                                                                                        • Changing the user password
                                                                                                                                                                                                                                                                                                          • Increase password security
                                                                                                                                                                                                                                                                                                            • Name person as an AXM user
                                                                                                                                                                                                                                                                                                              • Assign tasks/user roles to AXM users
                                                                                                                                                                                                                                                                                                            • Statistics and logs
                                                                                                                                                                                                                                                                                                              • Displaying and exporting a locking device’s access list
                                                                                                                                                                                                                                                                                                                • Displaying and exporting the physical access list of an identification medium
                                                                                                                                                                                                                                                                                                                  • Display doors for which a specific identification medium is authorised
                                                                                                                                                                                                                                                                                                                    • Displaying identification media which are authorised for a specific door
                                                                                                                                                                                                                                                                                                                      • Displaying a locking device’s equipment features
                                                                                                                                                                                                                                                                                                                        • View statistics and warnings (dashboard)
                                                                                                                                                                                                                                                                                                                          • Tracking activities in the database (log)
                                                                                                                                                                                                                                                                                                                            • Setting the log archiving period
                                                                                                                                                                                                                                                                                                                            • Reports
                                                                                                                                                                                                                                                                                                                              • Displaying the report for identification media issue
                                                                                                                                                                                                                                                                                                                                • Exporting the data protection report (GDPR)
                                                                                                                                                                                                                                                                                                                              • Background knowledge and explanations
                                                                                                                                                                                                                                                                                                                                • Identification media, locking devices and the locking plan
                                                                                                                                                                                                                                                                                                                                  • Locking systems
                                                                                                                                                                                                                                                                                                                                    • “Engaging”, “opening”, “locking”, etc.
                                                                                                                                                                                                                                                                                                                                      • Synchronisation of database and actual state
                                                                                                                                                                                                                                                                                                                                        • Access and physical access lists
                                                                                                                                                                                                                                                                                                                                          • Event management
                                                                                                                                                                                                                                                                                                                                            • Time groups and schedules
                                                                                                                                                                                                                                                                                                                                              • Time switchovers
                                                                                                                                                                                                                                                                                                                                                • Examples
                                                                                                                                                                                                                                                                                                                                              • Authorisation groups
                                                                                                                                                                                                                                                                                                                                                • Person groups
                                                                                                                                                                                                                                                                                                                                                  • Passwords used
                                                                                                                                                                                                                                                                                                                                                    • Buildings and locations
                                                                                                                                                                                                                                                                                                                                                      • Areas
                                                                                                                                                                                                                                                                                                                                                        • Hashtags
                                                                                                                                                                                                                                                                                                                                                          • Reports
                                                                                                                                                                                                                                                                                                                                                            • Scaling image files
                                                                                                                                                                                                                                                                                                                                                            • Cards and locking device IDs
                                                                                                                                                                                                                                                                                                                                                              • Card templates
                                                                                                                                                                                                                                                                                                                                                            • Help and other information