logo
Language
deutschenglishfrançaisnederlandsitalianodansksvensk
  • Home
  • General safety instructions
    • Product-specific safety instructions
      • Meaning of the text formatting
        • Intended use
          • General
            • Information on data protection
              • IT basic protection
                • What protection requirements do the data processed in the system have?
                  • What IT infrastructure requirements are recommended?
                  • Encryption
                    • Is the data in System 3060 encrypted?
                      • What data is encrypted?
                        • Are the transmission paths via radio, for example, also encrypted?
                        • Working in compliance with data protection regulations (GDPR)
                          • What personal data is stored in the software?
                            • For what purpose is personal data stored in the software?
                              • How long is personal data stored in the software?
                                • Can the right to read access lists be additionally secured?
                                  • Is personal data in the software protected against access by third parties?
                                    • Can the stored data be made available as a copy?
                                      • Can personal data be deleted from the software?
                                    • Range of functions for AXM Lite
                                      • System requirements
                                        • Release notes
                                          • Version 1.0.2306.1402
                                            • Version 1.0.2205.2402
                                              • Version 1.0.2401.0501
                                                • Version 1.0.2402.2701
                                                  • Version 1.0.2502.0602
                                                  • Installation
                                                    • Run AXM as the administrator (recommended)
                                                      • Updating AXM
                                                      • First steps after a new installation
                                                        • Best practice: setting up the locking system
                                                          • Best practice: Database protection
                                                          • Registration
                                                            • The AXM’s structure
                                                              • Sorting and filtering
                                                                • Installation wizards
                                                                  • Multiple options, same result
                                                                    • Global search
                                                                      • Working with AXM more effectively
                                                                        • Tab operation
                                                                          • Hotkeys
                                                                            • Creating additional objects
                                                                          • Organisational structure
                                                                            • Creating access levels
                                                                              • Creating a schedule
                                                                                • Create time group
                                                                                  • Deleting a time group
                                                                                    • Deleting schedules
                                                                                      • Creating a time switchover
                                                                                        • Creating and editing public holidays
                                                                                          • Creating and editing public holiday lists
                                                                                            • Creating a location
                                                                                              • Creating a building and assigning it to a location
                                                                                                • Creating a hashtag
                                                                                                • Persons and identification media
                                                                                                  • Creating an identification medium
                                                                                                    • Creating transponders and cards
                                                                                                      • Creating PIN code keypads
                                                                                                        • Creating special identification media
                                                                                                        • Duplicating an identification medium (including authorisations and settings)
                                                                                                          • Deleting an identification medium
                                                                                                            • Deleting a card/transponder
                                                                                                              • Deleting individual identification media in the matrix
                                                                                                                • Deleting multiple identification media using the tab
                                                                                                                • Deleting a PIN (PIN code keypad AX)
                                                                                                                • Allowing an identification medium to open twice as long
                                                                                                                  • Muting all locking devices for an identification medium
                                                                                                                    • Muting all locking devices for a transponder or a card
                                                                                                                    • Allow accesses to be recorded by identification media (physical access list)
                                                                                                                      • Restricting identification medium authorisations to specific times (time group)
                                                                                                                        • Activating or deactivating identification medium once at specific times (activation and expiry date)
                                                                                                                          • Handling defective identification media
                                                                                                                            • Repairing/resynchronising
                                                                                                                              • Repairing a card/transponder (resynchronising)
                                                                                                                                • Repairing a PIN code keypad (resynchronising)
                                                                                                                                • Resetting and replacing
                                                                                                                                  • Resetting and replacing a card/transponder
                                                                                                                                    • Resetting and replacing a PIN code keypad
                                                                                                                                    • Delete and replace
                                                                                                                                      • Deleting and replacing a card/transponder
                                                                                                                                        • Deleting and replacing a PIN code keypad
                                                                                                                                        • Take out of use and leave in project
                                                                                                                                          • Take card/transponder out of use and leave in project
                                                                                                                                            • Taking a PIN code keypad out of use and leaving it in project
                                                                                                                                            • Taking out of use and deleting from the project
                                                                                                                                              • Taking a card/transponder out of use and deleting it from project
                                                                                                                                                • Taking a PIN code keypad out of use and deleting it from project
                                                                                                                                              • Duplicating forgotten identification medium temporarily
                                                                                                                                                • Duplicating a forgotten transponder or card temporarily
                                                                                                                                                • Blocking lost/stolen identification media permanently
                                                                                                                                                  • Blocking and replacing lost/stolen card/transponder permanently
                                                                                                                                                    • Blocking a lost/stolen PIN code keypad permanently
                                                                                                                                                    • Flag and reset returned identification medium (back to inventory)
                                                                                                                                                      • Flagging and resetting returned card/transponder (back to inventory)
                                                                                                                                                      • Planning and tracking identification medium management tasks
                                                                                                                                                        • Noting the issue date
                                                                                                                                                          • Note card/transponder issue date
                                                                                                                                                          • Planning and logging battery replacement
                                                                                                                                                            • Planning and logging card/transponder battery changes
                                                                                                                                                              • Planning and logging PIN code keypad battery replacement
                                                                                                                                                              • Planning and logging return
                                                                                                                                                                • Planning and logging card/transponder return
                                                                                                                                                              • Finding the identification medium or locking device again in the matrix
                                                                                                                                                                • Exporting identification media as a list
                                                                                                                                                                  • Export cards/transponders as a list
                                                                                                                                                                    • Exporting PINs and PIN code keypads as a list
                                                                                                                                                                    • Viewing an identification medium’s serial number and/or TID
                                                                                                                                                                      • Viewing a card’s/transponder’s serial number and TID
                                                                                                                                                                        • Viewing a PIN code keypad’s serial number
                                                                                                                                                                        • Setting the PIN length (PinCode AX)
                                                                                                                                                                          • Changing a PIN (PinCode AX)
                                                                                                                                                                          • Doors and locking devices
                                                                                                                                                                            • Creating a locking device
                                                                                                                                                                              • Duplicating the locking device (including authorisations and settings)
                                                                                                                                                                                • Delete locking device
                                                                                                                                                                                  • Deleting an individual locking device using the matrix
                                                                                                                                                                                    • Deleting several locking devices using the tab
                                                                                                                                                                                    • Changing locking device type at later stage
                                                                                                                                                                                      • Handling defective locking devices
                                                                                                                                                                                        • Re-synchronise (repair)
                                                                                                                                                                                          • Resetting and replacing
                                                                                                                                                                                            • Delete and replace
                                                                                                                                                                                              • Reset
                                                                                                                                                                                                • Purge (only reset in database/software reset)
                                                                                                                                                                                                • Assigning locking devices to buildings/locations
                                                                                                                                                                                                  • Limiting authorisations for locking devices to specific times (schedule)
                                                                                                                                                                                                    • Engaging and disengaging locking devices automatically with time switchover
                                                                                                                                                                                                      • Have accesses logged by locking device (access list)
                                                                                                                                                                                                        • Leaving the locking device open for longer, less time or permanently
                                                                                                                                                                                                          • Limit locking device read range (close range mode)
                                                                                                                                                                                                            • Muting a locking device (for battery warnings and programming)
                                                                                                                                                                                                              • Ignoring activation and expiry date of identification media
                                                                                                                                                                                                                • Setting up door monitoring (DoorMonitoring)
                                                                                                                                                                                                                  • Setting up DoorMonitoring for locking cylinders
                                                                                                                                                                                                                  • Changing the SmartRelay settings
                                                                                                                                                                                                                    • Using internal and external antenna simultaneously
                                                                                                                                                                                                                      • Invert outputs
                                                                                                                                                                                                                        • Using the serial interface
                                                                                                                                                                                                                          • Changing the signalling
                                                                                                                                                                                                                          • Planning and tracking locking device management tasks
                                                                                                                                                                                                                            • Note installation, replacement or removal date
                                                                                                                                                                                                                              • Planning and logging battery replacement
                                                                                                                                                                                                                              • Exporting locking devices as a list
                                                                                                                                                                                                                              • Permissions
                                                                                                                                                                                                                                • Changing individual authorisations (cross)
                                                                                                                                                                                                                                  • Changing many authorisations (on identification media and/or locking devices)
                                                                                                                                                                                                                                    • Allowing all or blocking all
                                                                                                                                                                                                                                      • Access levels
                                                                                                                                                                                                                                        • Adding locking devices and identification media to access levels
                                                                                                                                                                                                                                          • Exporting access levels as a list
                                                                                                                                                                                                                                          • Controlling authorisations in terms of time (schedules)
                                                                                                                                                                                                                                            • Adding locking devices to the schedule
                                                                                                                                                                                                                                              • Adding identification medium to time group
                                                                                                                                                                                                                                                • Add card/transponder to time group
                                                                                                                                                                                                                                                  • Adding PINs from a PIN code keypad to the time group
                                                                                                                                                                                                                                              • Meaning of the authorisation crosses in the matrix
                                                                                                                                                                                                                                              • Locking systems
                                                                                                                                                                                                                                                • Changing locking system password
                                                                                                                                                                                                                                                  • Using a common locking level
                                                                                                                                                                                                                                                    • Creating a common locking level
                                                                                                                                                                                                                                                      • Creating transponders for common locking level
                                                                                                                                                                                                                                                        • Authorising a transponder with common locking level
                                                                                                                                                                                                                                                      • Synchronisation: Comparison between locking plan and reality
                                                                                                                                                                                                                                                        • Synchronising the locking device (including reading access list)
                                                                                                                                                                                                                                                          • Display locking device equipment and status
                                                                                                                                                                                                                                                            • Displaying and exporting a locking device’s access list
                                                                                                                                                                                                                                                            • Identifying an unknown locking device
                                                                                                                                                                                                                                                              • Re-setting the locking device
                                                                                                                                                                                                                                                                • Synchronising an identification medium
                                                                                                                                                                                                                                                                  • Synchronise a card/transponder (including importing physical access list)
                                                                                                                                                                                                                                                                    • Displaying the identification medium battery status
                                                                                                                                                                                                                                                                      • Displaying and exporting physical access lists for cards/transponders
                                                                                                                                                                                                                                                                    • Identifying an unknown ID medium
                                                                                                                                                                                                                                                                      • Recognise unknown cards/transponders
                                                                                                                                                                                                                                                                        • Identifying unknown PIN code keypad
                                                                                                                                                                                                                                                                        • Resetting identification media
                                                                                                                                                                                                                                                                          • Resetting cards/transponders
                                                                                                                                                                                                                                                                            • Resetting the PIN code keypad
                                                                                                                                                                                                                                                                            • Viewing connected/supported programming devices
                                                                                                                                                                                                                                                                            • Your personalised AXM interface
                                                                                                                                                                                                                                                                              • Interchanging (transposing) doors and persons in the matrix
                                                                                                                                                                                                                                                                                • Select columns and rows in the matrix (enable/disable crosshairs)
                                                                                                                                                                                                                                                                                  • Click to change authorisations
                                                                                                                                                                                                                                                                                    • Hiding deactivated and defective identification media
                                                                                                                                                                                                                                                                                      • Showing or hiding rows/columns in the matrix
                                                                                                                                                                                                                                                                                        • Reading access list/physical access list during synchronisation
                                                                                                                                                                                                                                                                                          • Limiting the number of access list entries in the database
                                                                                                                                                                                                                                                                                            • Pinning tabs
                                                                                                                                                                                                                                                                                              • Changing automatic numbering
                                                                                                                                                                                                                                                                                                • Changing the language
                                                                                                                                                                                                                                                                                                  • Preventing generated reports from opening automatically
                                                                                                                                                                                                                                                                                                  • Administrative tasks
                                                                                                                                                                                                                                                                                                    • Creating a backup
                                                                                                                                                                                                                                                                                                      • Restoring the backup
                                                                                                                                                                                                                                                                                                        • Exporting error logs
                                                                                                                                                                                                                                                                                                          • Displaying version number and licence key for the AXM installed
                                                                                                                                                                                                                                                                                                            • User management
                                                                                                                                                                                                                                                                                                              • Changing the user password
                                                                                                                                                                                                                                                                                                                • Increase password security
                                                                                                                                                                                                                                                                                                              • Statistics and logs
                                                                                                                                                                                                                                                                                                                • Displaying and exporting a locking device’s access list
                                                                                                                                                                                                                                                                                                                  • Displaying and exporting physical access lists for cards/transponders
                                                                                                                                                                                                                                                                                                                    • Display doors for which a specific identification medium is authorised
                                                                                                                                                                                                                                                                                                                      • Displaying identification media which are authorised for a specific door
                                                                                                                                                                                                                                                                                                                        • Displaying a locking device’s equipment features
                                                                                                                                                                                                                                                                                                                          • View statistics and warnings (dashboard)
                                                                                                                                                                                                                                                                                                                            • Tracking activities in the database (log)
                                                                                                                                                                                                                                                                                                                              • Setting the log archiving period
                                                                                                                                                                                                                                                                                                                            • Background knowledge and explanations
                                                                                                                                                                                                                                                                                                                              • Identification media, locking devices and the locking plan
                                                                                                                                                                                                                                                                                                                                • “Engaging”, “opening”, “locking”, etc.
                                                                                                                                                                                                                                                                                                                                  • Synchronisation of database and actual state
                                                                                                                                                                                                                                                                                                                                    • Access and physical access lists
                                                                                                                                                                                                                                                                                                                                      • Event management
                                                                                                                                                                                                                                                                                                                                        • Time groups and schedules
                                                                                                                                                                                                                                                                                                                                          • Time switchovers
                                                                                                                                                                                                                                                                                                                                            • Examples
                                                                                                                                                                                                                                                                                                                                          • Access levels
                                                                                                                                                                                                                                                                                                                                            • Passwords used
                                                                                                                                                                                                                                                                                                                                              • Buildings and locations
                                                                                                                                                                                                                                                                                                                                                • Hashtags
                                                                                                                                                                                                                                                                                                                                                  • DoorMonitoring
                                                                                                                                                                                                                                                                                                                                                    • Possible DoorMonitoring states of locking cylinders
                                                                                                                                                                                                                                                                                                                                                      • Possible DoorMonitoring states of SmartHandles
                                                                                                                                                                                                                                                                                                                                                        • Possible DoorMonitoring states of SmartRelais 3
                                                                                                                                                                                                                                                                                                                                                      • Help and other information
                                                                                                                                                                                                                                                                                                                                                        1. Home
                                                                                                                                                                                                                                                                                                                                                        2. Administrative tasks

                                                                                                                                                                                                                                                                                                                                                        Administrative tasks - AXM Lite

                                                                                                                                                                                                                                                                                                                                                        Further information

                                                                                                                                                                                                                                                                                                                                                        • Creating a backup
                                                                                                                                                                                                                                                                                                                                                        • Restoring the backup
                                                                                                                                                                                                                                                                                                                                                        • Exporting error logs
                                                                                                                                                                                                                                                                                                                                                        • Displaying version number and licence key for the AXM installed
                                                                                                                                                                                                                                                                                                                                                        • User management

                                                                                                                                                                                                                                                                                                                                                        © 2025 SimonsVoss Technologies GmbH - Classification: Public

                                                                                                                                                                                                                                                                                                                                                        Download document (Manual: AXM Lite) as PDF