Language
deutsch
english
français
nederlands
italiano
dansk
svensk
Home
General safety instructions
Product-specific safety instructions
Meaning of the text formatting
Intended use
General
Information on data protection
IT basic protection
What protection requirements do the data processed in the system have?
What IT infrastructure requirements are recommended?
Encryption
Is the data in System 3060 encrypted?
What data is encrypted?
Are the transmission paths via radio, for example, also encrypted?
Working in compliance with data protection regulations (GDPR)
What personal data is stored in the software?
For what purpose is personal data stored in the software?
How long is personal data stored in the software?
Is personal data in the software protected against access by third parties?
Can the stored data be made available as a copy?
Can personal data be deleted from the software?
Range of functions
System requirements
Installation
Run AXM as the administrator
Updating AXM
First steps after a new installation
Best practice: setting up the locking system
Best practice: Database protection
Encrypting an internal hard drive with BitLocker
Encrypt external hard drive with BitLocker to go
Checking Trusted Platform Module (TPM)
Verifying BIOS mode
Registration
The AXM’s structure
Sorting and filtering
Installation wizards
Multiple options, same result
Global search
Working with AXM more effectively
Tab operation
Hotkeys
Creating additional objects
Organisational structure
Creating authorisation groups
Creating a person group
Creating a schedule
Create time group
Deleting a time group
Deleting schedules
Creating a time switchover
Creating and editing public holidays
Creating and editing public holiday lists
Creating a location
Creating a building and assigning it to a location
Creating an area
Creating a hashtag
Persons and identification media
Creating an identification medium
Duplicating an identification medium (including authorisations and settings)
Deleting an identification medium
Deleting individual identification media in the matrix
Deleting multiple identification media using the tab
Allowing an identification medium to open twice as long
Muting all locking devices for an identification medium
Allow accesses to be recorded by identification media (physical access list)
Restricting identification medium authorisations to specific times (time group)
Activating or deactivating identification medium once at specific times (activation and expiry date)
Handling defective identification media
Re-synchronise (repair)
Resetting and replacing
Delete and replace
Take out of use and leave in database
taking out of use and deleting from the database
Duplicating forgotten identification medium temporarily
Blocking and replacing lost/stolen identification media permanently
Flag and reset returned identification medium (back to inventory)
Planning and tracking identification medium management tasks
Noting the issue date
Planning and logging battery replacement
Planning and logging return
Finding the identification medium or locking device again in the matrix
Exporting identification media as a list
Viewing an identification medium’s serial number and TID
Assigning persons to person groups
Assigning individual persons/identification media to a person group (in transponder window)
Assign a number of persons/identification media to person group (in the person group window)
Use identification media in multiple locking systems
Reuse identification medium in the same project
Reusing identification medium in other projects/databases
Doors and locking devices
Creating a locking device
Duplicating the locking device (including authorisations and settings)
Delete locking device
Deleting an individual locking device using the matrix
Deleting several locking devices using the tab
Changing locking device type at later stage
Handling defective locking devices
Re-synchronise (repair)
Resetting and replacing
Replacing and deleting
Reset
Purge (only reset in database/software reset)
Assigning locking devices to buildings/locations
Moving locking devices to areas
Assigning individual locking devices to a different area (in the locking device window)
Assign multiple locking devices to another area (in the area window)
Limiting authorisations for locking devices to specific times (schedule)
Engaging and disengaging locking devices automatically with time switchover
Have accesses logged by locking device (access list)
Leaving the locking device open for longer, less time or permanently
Limit locking device read range (close range mode)
Muting a locking device (for battery warnings and programming)
Activating and deactivating card readers
Ignoring activation and expiry date of identification media
Changing the SmartRelay settings
Using internal and external antenna simultaneously
Invert outputs
Using the serial interface
Changing the signalling
Planning and tracking locking device management tasks
Note installation, replacement or removal date
Planning and logging battery replacement
Displaying all locking devices in a project
Exporting locking devices as a list
Permissions
Changing individual authorisations (cross)
Changing many authorisations (on identification media and/or locking devices)
Allowing all or blocking all
Authorisation groups
Adding locking devices and identification media to authorisation groups
Adding areas and person groups to authorisation groups
Show all authorisation groups in a project
Exporting authorisation groups as a list
Controlling authorisations in terms of time (schedules)
Adding locking devices to the schedule
Adding identification medium to time group
Add area, including locking devices, to a schedule
Meaning of the authorisation crosses in the matrix
Locking systems
Create locking system
Adding a card configuration
MIFARE Classic (new/empty card)
MIFARE Classic (card already used)
MIFARE DESFire (new/empty card)
MIFARE DESFire (card already in use)
Changing locking system password
Replacing the locking system
Enabling PIN code keypads
Enable cards or transponders
Synchronisation: Comparison between locking plan and reality
Synchronising the locking device (including reading access list)
Display locking device equipment and status
Displaying and exporting a locking device’s access list
Identifying an unknown locking device
Re-setting the locking device
Synchronise an identification medium (including importing physical access list)
Displaying the transponder battery status
Displaying and exporting the physical access list of an identification medium
Identifying an unknown ID medium
Resetting the identification medium
Viewing connected/supported programming devices
Your personalised AXM interface
Interchanging (transposing) doors and persons in the matrix
Select columns and rows in the matrix (enable/disable crosshairs)
Click to change authorisations
Showing or hiding information in the matrix
Reading access list/physical access list during synchronisation
Limiting the number of access list entries in the database
Pinning tabs
Changing automatic numbering
Changing the language
Personalising reports and exports
Personalising properties for person details
Hide and show existing fields
Creating your own fields
Subsequently modified user-defined fields
Administrative tasks
Creating a backup
Restoring the backup
Exporting error logs
Displaying version number and licence key for the AXM installed
User management
Changing the user password
Increase password security
Name person as an AXM user
Assign tasks/user roles to AXM users
Statistics and logs
Displaying and exporting a locking device’s access list
Displaying and exporting the physical access list of an identification medium
Display doors for which a specific identification medium is authorised
Displaying identification media which are authorised for a specific door
Displaying a locking device’s equipment features
View statistics and warnings (dashboard)
Tracking activities in the database (log)
Setting the log archiving period
Reports
Displaying the report for identification media issue
Exporting the data protection report (GDPR)
Background knowledge and explanations
Identification media, locking devices and the locking plan
Locking systems
“Engaging”, “opening”, “locking”, etc.
Synchronisation of database and actual state
Access and physical access lists
Event management
Time groups and schedules
Time switchovers
Examples
Authorisation groups
Person groups
Passwords used
Buildings and locations
Areas
Hashtags
Reports
Scaling image files
Cards and locking device IDs
Card templates
Help and other information