Reporting An In-Depth Guide.

Slides:



Advertisements
Similar presentations
Welcome to the Award Winning Easiest to Use & Most Advanced View, Manage, and Control Security, Access Control, Video, Energy & Lighting Systems, & Critical.
Advertisements

Alarm Mode An in-depth guide. Overview Main module for loading configuration and monitoring system – Reader Open/Close – Arm/disarm zones – Control relays.
The Components There are three main components of inDepth Lite, inDepth and inDepth+ Real Time Component Reporting Package Configuration Tools.
Cardholder Configuration An in-depth guide. Overview Main module for cardholder database – Personal Info – Cards – Access Levels – Print Cards Reads &
UNESCO ICTLIP Module 4. Lesson 3 Database Design, and Information Storage and Retrieval Lesson 3. Information storage and retrieval using WinISIS.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 11: Monitoring Server Performance.
System Configuration An in-depth guide. Overview Main module for configuring system – Hardware – Access Levels – Maps – IF/THEN Functions – Operators/Permissions.
MS Access Advanced Instructor: Vicki Weidler Assistant:
FireRMS SQL Audit, Archiving & Purging Presented by Laura Small FireRMS Quality Assurance.
ENVIROTRAC: A Premier Chamber Monitoring and Data Acquisition System Envirotrac A Guided Tour.
Basic Administration.  Familiarize support staff with basic DSX administrative tasks  Provide expedited service to customers  Minimize the involvement.
APACS SOFTWARE MODULES Introduction to software functions.
Welcome!. Print Options PDF Comma-Separated Values (CSV) Formatted Excel New Features in Analysis.
All rights reserved, property and © CAD Computer GmbH & Co.KG 2009 Cover page.
Virtual Interaction Manager
All rights reserved, property and © CAD Computer GmbH & Co.KG 2009 Cover page.
Introduction to Databases Trisha Cummings. What is a database? A database is a tool for collecting and organizing information. Databases can store information.
MS Access 2007 Management Information Systems 1. Overview 2  What is MS Access?  Access Terminology  Access Window  Database Window  Create New Database.
Microsoft Access Database Software.
IPortal Bringing your company and your business partners together through customized WEB-based portal software. SanSueB Software Presents iPortal.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 11: Monitoring Server Performance.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
Microsoft FrontPage 2003 Illustrated Complete Integrating a Database with a Web Site.
COPYRIGHT © 2008 – APEX SOFTWARE LTD. ALL RIGHTS RESERVED Human Resources COPYRIGHT © 2008 – APEX SOFTWARE LTD. ALL RIGHTS RESERVED Integrator INTEGRATOR.
Introduction to KE EMu
Data Migration Training Page 1 KE EMu Data Migration
Introduction to KE EMu Unit objectives: Introduction to Windows Use the keyboard and mouse Use the desktop Open, move and resize a.
Introduction to KE EMu Unit objectives: Introduction to Windows Use the keyboard and mouse Use the desktop Open, move and resize a.
1 Chapter Overview Monitoring Access to Shared Folders Creating and Sharing Local and Remote Folders Monitoring Network Users Using Offline Folders and.
Controlsoft have 25 years experience in the development, manufacture and distribution of Access Control Solutions. With over 10,000 systems in daily use.
SQL Database Management
Exercises Complete Exercise 8 using profile 7, CAT2
The Consolidation Process The Intercompany Integration Solution for SAP Business One Version 2.0 for SAP Business One 9.1 Welcome to the course on the.
What’s New in ProMonitor 9
Project Management: Messages
Quick Instructor Guide
Introducing SmartView
IST 220 – Intro to Databases
MS Access Forms, Queries, Reports Matt Martin
Creating Custom Reports, Macros, and Switchboards
Adastra v3 Reporting & National Quality Requirements
Chapter 11 Designing Inputs, Outputs, and Controls.
Pilot Watcher Product Overview V5.3
MS Access Introduction Database Design.
End of Access Exam Review.
Access Security Integrator
HP SmartStream Production Center
Topics Introduction to Repetition Structures
MICROSOFT OUTLOOK and Outlook service Provider
Customization
Test Information Distribution Engine (TIDE)
The Consolidation Process The Intercompany Integration Solution for SAP Business One Version 2.0 for SAP Business One 9.1 Welcome to the course on the.
This presentation document has been prepared by Vault Intelligence Limited (“Vault") and is intended for off line demonstration, presentation and educational.
Tapping the Power of Your Historical Data
GO! with Microsoft® Access e
Research Grants Financial Reporting
Cover page.
Wavestore Integrates… Paxton Net2 Access Control
Optimizing Efficiency + Funding
Database Applications – Microsoft Access
STUDENT INFORMATION SYSTEM (SIS)
Introduction to EBSCOhost
Exploring Microsoft® Access® 2016 Series Editor Mary Anne Poatsy
Course: Module: Lesson # & Name Instructional Material 1 of 32 Lesson Delivery Mode: Lesson Duration: Document Name: 1. Professional Diploma in ERP Systems.
ID Card Billing from System Administration to Student Account
Training Module Introduction to the TB9100/P25 CG/P25 TAG Customer Service Software (CSS) Describes Release 3.95 for Trunked TB9100 and P25 TAG Release.
First steps with Personio
QTP Test Process
Report Subscription.
Assignment 3 Querying and Maintaining a Database
Presentation transcript:

Reporting An In-Depth Guide

Overview Two main modules Other reports throughout software Reporter Messages Extended Reports System configuration Combinations Other reports throughout software A very important part of an Access Control System is that every event in the system is recorded in the database. Being able to access those events in a useful and concise manner is very important for many parts of an organization that may use the data for different purposes. For this purpose there are two reporing applications in While most people think of an Access Control system as mainly for security, there can be many other valuable uses such as time and attendance (only paying people for the time they actually worked) and resource control (charging someone each time they enter into the cafeteria). Of course there are many security applications that use reporting such as incident investigation and tracking movements of particular users.

Reporter Select message types and desired objects The main module for reporting is Reporter which allows access to all the historical events that have occurred in the system. Remember that only the messages stored in the database are available. If messages have been deleted in order to shrink the database, they can’t be retrieved by Reporter. The main configuration screen is the Filter for the report. Using the intuitive drill-down interface, first the type of messages desired can be selected. This is a list of every possible message in the system. Type, group or individual message can be selected. Next the objects from which the selected messages originated are selected. Be careful to select message types and objects that match. An access grant message cannot be generated from an alarm point for example!

Reporter, cont. Results can be filtered further with time and card information The report filter can be further enhanced by adding time restrictions or information about cardholders. Again, remember that if filtering by cardholder information it will only apply to access type events.

Reporter - Options The format of reports can also be customized for columns included, sorting, color, format, etc. Report configurations can be saved and retrieved to be again.

Reporter – Command Line Pre-configured reports can be run from the command line to print or export on a schedule (Windows tasks) Can be used for integration Once reports have been configured in Reporter, they can be run automatically by calling them from the command line. In addition to automating the execution, this can be a part of a larger scripting operation that emails the reports or imports them to other third-party systems.

Extended Reports Preconfigured reports Extended Reports is a collection of pre-configured reports that can be quickly executed to see information about configuration of the system as well as event information. Configuration reports allow display of all cardholders with a specific access level, or all cardholders that have access to a particular readers. Reports for configuration of time zones or system hardware are other examples. Event reports allow viewing of access for a particular reader or a particular cardholder. Also included are Time and Attendance reports which will display the hours on site for cardholders based on IN/OUT events and reports about visitors on site.

Extended Reports Scheduled Reports Command Line Time and attendance reports can be scheduled to be printed or saved at regular intervals. Extended Reports must be running in the background for this to happen.

Application Reports Don’t forget many reports can be generated on the fly in different modules. Cardholder Configuration lists can be filtered and printed for very useful reports. In Alarm Mode there are mustering reports and cardholder trace reports.

Custom Reports Directly from database Custom applications Reporting options don’t stop at what is included in APACS. The database can be accessed directly in order to make custom reports for display on webpages or in creating custom output such as with Crystal Reports.