logo
Language
deutschenglishfrançaisnederlandsitalianodansksvensk
  • Home
  • General safety instructions
    • Product-specific safety instructions
      • Meaning of the text formatting
        • Intended use
          • General
            • Information on data protection
              • IT basic protection
                • What protection requirements do the data processed in the system have?
                  • What IT infrastructure requirements are recommended?
                  • Encryption
                    • Is the data in System 3060 encrypted?
                      • What data is encrypted?
                        • Are the transmission paths via radio, for example, also encrypted?
                        • Working in compliance with data protection regulations (GDPR)
                          • What personal data is stored in the software?
                            • For what purpose is personal data stored in the software?
                              • How long is personal data stored in the software?
                                • Is personal data in the software protected against access by third parties?
                                  • Can the stored data be made available as a copy?
                                    • Can personal data be deleted from the software?
                                  • Range of functions
                                    • System requirements
                                      • Installation
                                        • Run AXM as the administrator
                                          • Updating AXM
                                          • First steps after a new installation
                                            • Best practice: setting up the locking system
                                              • Best practice: Database protection
                                                • Encrypting an internal hard drive with BitLocker
                                                  • Encrypt external hard drive with BitLocker to go
                                                    • Checking Trusted Platform Module (TPM)
                                                      • Verifying BIOS mode
                                                    • Registration
                                                      • The AXM’s structure
                                                        • Sorting and filtering
                                                          • Installation wizards
                                                            • Multiple options, same result
                                                              • Global search
                                                                • Working with AXM more effectively
                                                                  • Tab operation
                                                                    • Hotkeys
                                                                      • Creating additional objects
                                                                    • Organisational structure
                                                                      • Creating authorisation groups
                                                                        • Creating a schedule
                                                                          • Create time group
                                                                            • Deleting a time group
                                                                              • Deleting schedules
                                                                                • Creating a time switchover
                                                                                  • Creating and editing public holidays
                                                                                    • Creating and editing public holiday lists
                                                                                      • Creating a location
                                                                                        • Creating a building and assigning it to a location
                                                                                          • Creating a hashtag
                                                                                          • Persons and identification media
                                                                                            • Creating an identification medium
                                                                                              • Duplicating an identification medium (including authorisations and settings)
                                                                                                • Deleting an identification medium
                                                                                                  • Deleting individual identification media in the matrix
                                                                                                    • Deleting multiple identification media using the tab
                                                                                                    • Allowing an identification medium to open twice as long
                                                                                                      • Muting all locking devices for an identification medium
                                                                                                        • Allow accesses to be recorded by identification media (physical access list)
                                                                                                          • Restricting identification medium authorisations to specific times (time group)
                                                                                                            • Activating or deactivating identification medium once at specific times (activation and expiry date)
                                                                                                              • Handling defective identification media
                                                                                                                • Re-synchronise (repair)
                                                                                                                  • Resetting and replacing
                                                                                                                    • Delete and replace
                                                                                                                      • Take out of use and leave in database
                                                                                                                        • taking out of use and deleting from the database
                                                                                                                        • Duplicating forgotten identification medium temporarily
                                                                                                                          • Blocking and replacing lost/stolen identification media permanently
                                                                                                                            • Flag and reset returned identification medium (back to inventory)
                                                                                                                              • Planning and tracking identification medium management tasks
                                                                                                                                • Noting the issue date
                                                                                                                                  • Planning and logging battery replacement
                                                                                                                                    • Planning and logging return
                                                                                                                                    • Finding the identification medium or locking device again in the matrix
                                                                                                                                      • Exporting identification media as a list
                                                                                                                                        • Viewing an identification medium’s serial number and TID
                                                                                                                                        • Doors and locking devices
                                                                                                                                          • Creating a locking device
                                                                                                                                            • Duplicating the locking device (including authorisations and settings)
                                                                                                                                              • Delete locking device
                                                                                                                                                • Deleting an individual locking device using the matrix
                                                                                                                                                  • Deleting several locking devices using the tab
                                                                                                                                                  • Changing locking device type at later stage
                                                                                                                                                    • Handling defective locking devices
                                                                                                                                                      • Re-synchronise (repair)
                                                                                                                                                        • Resetting and replacing
                                                                                                                                                          • Replacing and deleting
                                                                                                                                                            • Reset
                                                                                                                                                              • Purge (only reset in database/software reset)
                                                                                                                                                              • Assigning locking devices to buildings/locations
                                                                                                                                                                • Limiting authorisations for locking devices to specific times (schedule)
                                                                                                                                                                  • Engaging and disengaging locking devices automatically with time switchover
                                                                                                                                                                    • Have accesses logged by locking device (access list)
                                                                                                                                                                      • Leaving the locking device open for longer, less time or permanently
                                                                                                                                                                        • Limit locking device read range (close range mode)
                                                                                                                                                                          • Muting a locking device (for battery warnings and programming)
                                                                                                                                                                            • Ignoring activation and expiry date of identification media
                                                                                                                                                                              • Changing the SmartRelay settings
                                                                                                                                                                                • Using internal and external antenna simultaneously
                                                                                                                                                                                  • Invert outputs
                                                                                                                                                                                    • Using the serial interface
                                                                                                                                                                                      • Changing the signalling
                                                                                                                                                                                      • Planning and tracking locking device management tasks
                                                                                                                                                                                        • Note installation, replacement or removal date
                                                                                                                                                                                          • Planning and logging battery replacement
                                                                                                                                                                                          • Exporting locking devices as a list
                                                                                                                                                                                          • Permissions
                                                                                                                                                                                            • Changing individual authorisations (cross)
                                                                                                                                                                                              • Changing many authorisations (on identification media and/or locking devices)
                                                                                                                                                                                                • Allowing all or blocking all
                                                                                                                                                                                                  • Authorisation groups
                                                                                                                                                                                                    • Adding locking devices and identification media to authorisation groups
                                                                                                                                                                                                      • Exporting authorisation groups as a list
                                                                                                                                                                                                      • Controlling authorisations in terms of time (schedules)
                                                                                                                                                                                                        • Adding locking devices to the schedule
                                                                                                                                                                                                          • Adding identification medium to time group
                                                                                                                                                                                                        • Meaning of the authorisation crosses in the matrix
                                                                                                                                                                                                        • Locking systems
                                                                                                                                                                                                          • Changing locking system password
                                                                                                                                                                                                            • Enabling PIN code keypads
                                                                                                                                                                                                            • Synchronisation: Comparison between locking plan and reality
                                                                                                                                                                                                              • Synchronising the locking device (including reading access list)
                                                                                                                                                                                                                • Display locking device equipment and status
                                                                                                                                                                                                                  • Displaying and exporting a locking device’s access list
                                                                                                                                                                                                                  • Identifying an unknown locking device
                                                                                                                                                                                                                    • Re-setting the locking device
                                                                                                                                                                                                                      • Synchronise an identification medium (including importing physical access list)
                                                                                                                                                                                                                        • Displaying the transponder battery status
                                                                                                                                                                                                                          • Displaying and exporting the physical access list of an identification medium
                                                                                                                                                                                                                          • Identifying an unknown ID medium
                                                                                                                                                                                                                            • Resetting the identification medium
                                                                                                                                                                                                                              • Viewing connected/supported programming devices
                                                                                                                                                                                                                              • Your personalised AXM interface
                                                                                                                                                                                                                                • Interchanging (transposing) doors and persons in the matrix
                                                                                                                                                                                                                                  • Select columns and rows in the matrix (enable/disable crosshairs)
                                                                                                                                                                                                                                    • Click to change authorisations
                                                                                                                                                                                                                                      • Showing or hiding information in the matrix
                                                                                                                                                                                                                                        • Reading access list/physical access list during synchronisation
                                                                                                                                                                                                                                          • Limiting the number of access list entries in the database
                                                                                                                                                                                                                                            • Pinning tabs
                                                                                                                                                                                                                                              • Changing automatic numbering
                                                                                                                                                                                                                                                • Changing the language
                                                                                                                                                                                                                                                • Administrative tasks
                                                                                                                                                                                                                                                  • Creating a backup
                                                                                                                                                                                                                                                    • Restoring the backup
                                                                                                                                                                                                                                                      • Exporting error logs
                                                                                                                                                                                                                                                        • Displaying version number and licence key for the AXM installed
                                                                                                                                                                                                                                                          • User management
                                                                                                                                                                                                                                                            • Changing the user password
                                                                                                                                                                                                                                                              • Increase password security
                                                                                                                                                                                                                                                            • Statistics and logs
                                                                                                                                                                                                                                                              • Displaying and exporting a locking device’s access list
                                                                                                                                                                                                                                                                • Displaying and exporting the physical access list of an identification medium
                                                                                                                                                                                                                                                                  • Display doors for which a specific identification medium is authorised
                                                                                                                                                                                                                                                                    • Displaying identification media which are authorised for a specific door
                                                                                                                                                                                                                                                                      • Displaying a locking device’s equipment features
                                                                                                                                                                                                                                                                        • View statistics and warnings (dashboard)
                                                                                                                                                                                                                                                                          • Tracking activities in the database (log)
                                                                                                                                                                                                                                                                            • Setting the log archiving period
                                                                                                                                                                                                                                                                          • Background knowledge and explanations
                                                                                                                                                                                                                                                                            • Identification media, locking devices and the locking plan
                                                                                                                                                                                                                                                                              • “Engaging”, “opening”, “locking”, etc.
                                                                                                                                                                                                                                                                                • Synchronisation of database and actual state
                                                                                                                                                                                                                                                                                  • Access and physical access lists
                                                                                                                                                                                                                                                                                    • Event management
                                                                                                                                                                                                                                                                                      • Time groups and schedules
                                                                                                                                                                                                                                                                                        • Time switchovers
                                                                                                                                                                                                                                                                                          • Examples
                                                                                                                                                                                                                                                                                        • Authorisation groups
                                                                                                                                                                                                                                                                                          • Passwords used
                                                                                                                                                                                                                                                                                            • Buildings and locations
                                                                                                                                                                                                                                                                                              • Hashtags
                                                                                                                                                                                                                                                                                              • Help and other information