Sunteți pe pagina 1din 99

EL Series

Intelli-M Software
User Guide

www.stanleysecuritysolutions.com/el
Copyright© 2014 Stanley Security Solutions, Inc.
All rights reserved.

Information in this document is subject to change without notice and does not represent a commitment on the part
of Stanley Security Solutions, Inc. The software described in this document are furnished under a license agreement or
nondisclosure agreement.

This publication is intended to be an accurate description and set of instructions pertaining to its subject matter.
However, as with any publication of this complexity, errors or omissions are possible. Please call Stanley Security
Solutions, Inc at (855) 365-2407 if you see any errors or have any questions. No part of this manual and/or databases
may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying,
recording, or information storage and retrieval systems, for any purpose, without the express written permission of
Stanley Security Solutions, Inc.

This document is distributed as is, without warranty of any kind, either express or implied, respecting the contents of
this book, including but not limited to implied warranties for the publication’s quality, performance, merchantability,
or fitness for any particular purpose. Neither Stanley Security Solutions, Inc, nor its dealers or distributors shall be liable
to the user or any other person or entity with respect to any liability, loss, or damage caused or alleged to be caused
directly or indirectly by this publication.

QEL 200 is a registered trademark of Stanley Security Solutions, Inc.

Intelli-M is a registered trademark of Infinias Inc.

Microsoft, Windows, CE, and ActiveSync are registered trademarks of Microsoft Corporation.

A86136 REV B

Contents 2
Contents

4 Introduction
System Requirements  5
8 Installation
Needed Tools  9
Download 9
Install 10
18  Terms & Concepts
Terms 19
Concepts 20
24  Quick Setup
Easy Steps  25
License Your System  26
Create a Door  28
Create a Person (Add a User)  32
36 Import
40  User Interface
Page Layout  41
88 Troubleshoot
Installation Errors  89
Page Errors  90
92 Glossary
Event Category  93
Event Action  93
Event Reason  94

3 Contents
Introduction

Introduction
1
4
Intelli-M is the Access Control Software for the QEL 200 Wireless System. Please see
the EL Series User Guide for complete instructions before installing and configuring
Intelli-M.

System Requirements

Considerations
Intelli-M software can be run in a virtual environment such as VMWare ESXi or higher.

Operating Systems
Intelli-M utilizes Microsoft Windows® operating systems, preferably the most recent
version.

For installations of greater than 32 doors, we strongly recommend using a server class
operating system:

• Windows Server 2008 R2 (Recommended)


• Windows Server 2008
• Windows 7 Professional, Enterprise, Ultimate
• Windows Vista Professional, Enterprise, Ultimate
• Windows 8
• Windows Server 2012
Home or starter versions of Windows are not supported as they do not include the
required components.

Hardware

For 32 doors or Less:


A basic workstation class computer is sufficient. Recommended hardware specs.

• 2GB RAM
• 2GHz Processor
• 50GB Hard drive space
• Single 100Mb network interface
• Dual core 2GHz Processor

5 Introduction
For 32 – 128 Doors
• 4Gb RAM
• Intel i5 or higher Processor
• Dual core 2GHz Processor
• 100GB Hard disk space
• Single or dual 100Mb network interface

For > 128 Doors


• Intelli-M can make use of multiple processors and as much memory as can be made
available.
• Server and reporting services can be moved to another server to frees up resources
and improve performance.
• For specific recommendations, please contact Infinias.

Software
Intelli-M is designed to take advantage of key components provided by Microsoft:

IIS (Internet Information Server)


Microsoft’s web server. This server provides Intelli-M web pages to any standard
browser. IIS is included with the operating system and is installed by the Intelli-m Access
installer.

Message Queuing
By using transaction server, Intelli-M delivers a non-synchronous message queuing
architecture designed to be robust, highly scalable and resilient to spikes in demand.
This is also included with the operating system, but is installed by the Intelli-M Access
installer.

Introduction 6
Reporting Services
Provides reporting capabilities. Both reports and badges are delivered via Reporting
Services. To design reports, please download the free tool from Microsoft called Report
Builder (currently version 3).

SQL Server Intelli-M uses version 2008 or newer, and will automatically install the 32-bit
version of SQL Server 2008 R2 with Advanced Services if a compatible version of SQL
Server is not already installed. Intelli-M also requires Microsoft SQL Reporting Services,
a part of the SQL Server installation, to be installed as well.

All required software packages, including SQL Server 2008, will be automatically
configured during the installation process. Refer to the installation chapter for more
information.

7 Introduction
Installation

2
The Intelli-M installation package is a 1GB compressed, self-extracting file, available for
download from our website at www.stanleysecuritysolutions.com/el or through the
ACS Server. Please follow the ACS Quick Start Guide to complete installation.

Needed Tools

Steps Tools
1 Download • www.stanleysecuritysolutions.com/el
• License Key and Password
• Host Computer (A PC Computer where
Intelli-M will be installed)
• System Requirements (see Chaper 1,
Introduction)
• Must have either Internet Explorer 9 or
above, Chrome, Safari, or Firefox
2 Install • Host Computer (A PC Computer where
Intelli-M will be installed)
• System Requirements (see Chaper 1,
Introduction)
• Must have either Internet Explorer 9 or
above, Chrome, Safari, or Firefox

Download
1 From your Host Computer (where you intend for Intelli-M installation), go to
www.stanleysecuritysolutions.com/el and select the Software Download.
2 Go through checkout process.
3 Begin Download.

9 Installation
Install
1 After Intelli-M has completed it’s download, go to Local Disk (C:) Drive > Users >
your username > Downloads > Setup.exe (or go to where your browser is set up to
store downloaded files.

2 Click Next

Installation 10
3 Click the ‘I accept the terms in the license agreement’ check box.
4 Click Next

11 Installation
5 The default path is C:\Program Files\Infinias\Intelli-M unless you are installing to
a 64-bit version of Windows, in which case the default path will be C:\Program
Files (x86)\Infinias\Intelli-M. To accept the default path, press the Next button.
(Or modify the path to a new location on your hard drive and then press the Next
button.)

6 For a typical installation, choose the default setting of ‘Complete’ and press the
‘Next’ button.
The Custom option is for users who have any of the following scenarios:
• You already have a pre-existing instance of SQL Server 2008 R2 installed, either
on the local computer or on a remote computer. (See the important note below
regarding pre-existing SQL Server instances.)
• You are installing Intelli-M onto a computer that already has a web-based
application installed and is already listening on port 80. (See the important note
below regarding changing the name and location of the website.)
If neither of these apply, or if you don’t know if they apply, leave the ‘Complete’
radio button selected and press the ‘Next’ button. Skip to the “Ready to Install the
Program” section.

Installation 12
If you have SQL Server installed and wish to use your SQL Server, select the ‘Custom’
radio button and press the ‘Next’ button.

Note: Many application installations do not respect the existing IIS configuration.
Some installations will change the name of the default IIS website from “Default
Web Site” to another name. Some might delete the default website altogether.
In either case, the application probably has taken ownership of port 80 (and
possibly port 443), preventing Intelli-M from being able to use port 80. Other
applications disable IIS altogether because they run a third-party web server like
Apache. In all of these cases, you can still install Intelli-M on this computer.

In the case where “Default Web Site” has been changed or removed, you can
either provide the new name to the Intelli-M installer, or you can choose your
own name and provide an unused port number (e.g. 8000 or 8080). If IIS has
been disabled, it was disabled so the third party web server could use port 80.
In that case, change the port number in the “Internet Services Information
(IIS) Manager” utility to an unused port number (e.g. 8000 or 8080), re-
enable “Default Web Site”, and provide the new port number to the Intelli-M
installation.

13 Installation
Note: Intelli-M requires SQL Server Standard/Enterprise 2008 R2 or SQL Server Express
2008 R2 with Advanced Services. Regardless of which Edition you have installed,
you must configure SQL Server to allow Mixed Mode Authentication – the SQL
Server must allow both SQL Authentication and Windows Authentication. You
can modify this configuration property using SQL Management Studio.

Finally, you must have SQL Reporting Services installed as well. If you do not,
the installation will succeed but the ‘Reports’ page will show an error. If you do
not need the reports feature in Intelli-M, then you do not need to install the
Reporting Services option in SQL Server. If you will be using the reports feature
of Intelli-M, please run your SQL Server installation again and add Reporting
Services to the installation. After that is complete, run the Intelli-M installation.
If you have already installed Intelli-M, simply run the Intelli-M installation again
and choose the ‘Repair’ option.

7 If you selected the Complete Installation, Click Install.

Note If you run into issues with the Custom Installation, please contact Infinias
Technical Support at (866) 496-5783.

Installation 14
Note: The installation process may take up to one hour. If SQL needs to be installed,
a process window will appear and display the progress. Should anything go
wrong, the SQL install will abort the Intelli-M install as well and display a failure
pop-up window. If this occurs, please contact Infinias Technical Support.

15 Installation
8 Click Finish

Installation 16
Terms & Concepts

3
Terms

Door vs. Zone


The Door occupies a physical space, and its border areas are called Zones. When
applying privileges to a Door you’re granting access to a Zone.

Upon installation, Intelli-M creates two default Zones: Inside and Outside. In general,
they represent the inside of your building or office and the outside of your building or
office.

Inside the building you may want secure interior doors . Each secured door also borders
two Zones: the interior of the floor/building and the space you wish to secure. You may
re-use the Inside Zone for the unsecured side of the door and create a new Zone, (e.g.
Dental Records Room) to serve as the name of the secured space. When configuring
access privileges, you will grant access to the Dental Records Room Zone, not the Door
that borders it.

You can re-use Zones in more than one way.

1 One way is to re-use the Inside Zone because it represents the same physical space
as your perimeter doors (see example above).
2 Another opportunity to re-use a Zone name is when the same people will always
have identical access privileges to multiple areas. For example, if a dentist office
has three patient rooms and the same people always have identical access to these
rooms, you can create a single Zone (e.g. Patient Rooms) to represent this entire
space.

Muster Zone
A Muster Zone is a Zone tagged with ‘In Muster’ or ‘Out Muster’. When you tag a Zone
with ‘In Muster’, Intelli-M will track all users who enter that Zone. You can also tag a
Zone with ‘Out Muster’ to track both sides of a Door.

A special Muster View on the Events Page displays the location of all cardholders in
these Muster Zones in real-time.

Cardholder vs. Group


Intelli-M defines a cardholder and configures the cardholder’s access rights. It also
puts the Cardholder into a Group, similar to how Windows has Users and Groups. All
cardholders must be a member of one Group, and can be a member of multiple Groups.

Access Privileges are applied to Groups, not individual Cardholders. Therefore you can

19 Terms & Concepts


modify the access privileges of a large number of Cardholders with one configuration
change. You can also change access privileges for a Cardholder by adding/removing
them from a Group.

Concepts

Door Types
A Door Type is a template that describes the input and output configuration gathered
into a single unit. Intelli-M installs several default Door Types.

Most or all your Doors’ wiring configuration is already described in one of the default
Door Types, but if you have Doors with atypical needs, you can create your own Door
Type.

Door Behavior
Door Behavior declares the Door’s unlock schedule and the mode of the attached card
reader(s), such as “Card Only” mode or Unlock mode.

Intelli-M creates one behavior by default: the “Always Locked” Behavior. This single
behavior covers the typical operating procedures for most of your doors.

Rules and Privileges


Privilege is the combination of a Group (who has access), a Zone (where is access
granted), and a Schedule (when is access granted). You can create as many Privileges as
desired.

A Rule is “what to do when something happens.” For example, a Privilege is a type of


a Rule (i.e. “what to do when a card is swiped or a PIN is entered”). Other examples
include sending emails, locking and unlocking any Zone or Door, and energizing or de-
energizing one of the Door’s outputs. (See more information in Advanced Setup and
Configuration.)

Terms & Concepts 20


Schedules and Holiday Sets
A Schedule is a stand-alone time range that defines a seven-day week. Each day has a
set of zero or more time ranges that you define.

Active Time Range is displayed in blue. Inactive Time Range is displayed in white.

This Schedule can be applied to a Door (via Door Behavior) as an unlock schedule; to a
Person (via Group membership) to define the hours they may access a Zone; or to a Rule
to define when it may be active.

For example, when a Schedule is applied to a Door, the Door will be unlocked during
the Active Time Range (blue section), and unlocked during the Inactive Time Range
(white section).

A Holiday is a single day in which normal business hours are altered, such as
Thanksgiving or Christmas.

A Holiday Set is a grouping of Holidays in which the altered business hours match.

For example, a Holiday Set might consist of New Year’s, Thanksgiving, the day after
Thanksgiving, and Christmas Day, when the office is closed.

Another Holiday Set might consist of Christmas Eve and New Year’s Eve because the
office hours are a half day.

Once you’ve established your Holiday Set, you can assign a set of zero or more time
ranges that define that Holiday Set. You can then apply that Holiday Set to a Schedule
you’ve created.

You can assign a complex Schedule to any Door Behavior, Person Group, or Rule.

21 Terms & Concepts


Events and Alarms
By default, Intelli-M identifies an Alarm as the usual access denial events, but you can
custom an Alarm using the Rules Engine. (See more information in Advanced Setup and
Configuration.)

Alarm Acknowledgement
Automatic Alarm Acknowledgement allows you determine which events are important

Reports
Intelli-M utilizes Microsoft’s Reporting Services engine and its tools, allowing you to
customize your reports.

Custom-printed cardholder’s badges also utilize the Reporting Services Engine, giving
you complete control over badge design.

Terms & Concepts 22


Quick Setup

4
Easy Steps
Follow these steps to get Intelli-M up and running in minutes.

Note Before configuring your system, please see the EL Series User Guide for
complete instructions on your QEL 200 Wireless System.

Steps
1 Login
2 License Your System
3 Create a Door
4 Create a Person
5 Create an Access Privilege

Login
1 Default Username is: admin and Password is: admin

Note Stanley recommends changing your password for increased security.

25 Quick Setup
License Your System
1 Click on Edit Dealer under Actions.

2 Enter Dealer information and Click Save. Notice that the Dealer Information has
been updated on the front page.

XXX-XXX-XXXX

XXX-XXX-XXXX

Quick Setup 26
3 Click on Edit Customer under Actions.
4 Enter Customer information and Click Save. Notice that the Customer Information
has been updated on the front page.

XXX-XXX-XXXX

XXX-XXX-XXXX

XXX-XXX-XXXX

5 Click on Activate License under Actions and enter License Key and Password. The
License Key and Password is issued with every QEW Gateway package.
6 Click Activate.

27 Quick Setup
Create a Door
1 Click Home in the upper right hand corner.
2 Click Configuration. The main page in this section is the Doors Page.
3 Click Create Doors under Actions.

Choose a Door Name


1 Choose appropriate name (i.e. Front Lobby).

Choose a Device
1 Select either Stanley EL Series or Stanley QIC.
If you choose Stanley EL Series, continue with Choose a Time Zone on Page 30. If you
choose Stanley QIC, follow next instructions.

2 Choose a Time Zone. Choose the time zone in which the controller is physically
located. (For most installations this is the currently selected time zone.)
3 Choose a Door Behavior. Even if you want this first door to be unlocked during
business hours, you can still get the Door up and running by choosing the default
“Always Locked” Behavior. And if the door is supposed to be locked all the time,
you’ll not need to revisit this later.
4 Select the two Zones that the Door borders. The “Secured (Inside)” Zone represents
the physical space that you want to secure access. The “Unsecured (Outside)” Zone
represents the physical space that is unsecured, and is where the proximity card
reader (“IN Reader”) will be located that grants access to the Secured Zone. If you
have 2 readers, you will configured the second reader (“OUT Reader”) below.
5 Choose an IP Address. The “IP Address” combo box will contain all door controllers
that were automatically discovered by the system. All controllers that are within
the Intelli-M Access server’s subnet will be discoverable, and any controllers outside

Quick Setup 28
the subnet (i.e. with a router between the controller(s) and the server) will not
be discoverable. If the IP Address of your device is not found, simply type the IP
address in the combo box.
6 Choose a Serial Number. If you chose an IP Address that was discovered, the Serial
Number combo box will automatically choose the correct Serial Number for you
from its list of discovered devices. If you manually entered an IP address in the IP
Address combo box, then manually enter the Serial Number found on the sticker of
the controller.
7 Press ‘Test Connect’ Button. This step is optional but it helps confirm that the IP
Address and Serial Number are correct. If the Test Connect fails, then make sure
you can ping the controller and also view its website in a web browser. If Test
Connect fails even after you’ve resolved any connectivity issues, please contact
technical support for assistance.
8 Choose a Door Type. If your door has a door contact sensor, please connect that
sensor to Input 1 (“IN1”) on the controller, and choose “1 or 2 Reader IN1 Normally
Closed” Door Type. If you do not have a door contact sensor, or if you sensor is a
Normally-Open sensor, choose “1 or 2 Reader IN1 Normally Open” Door Type. You
may also press the ‘Diagram’ button to view a superset of connection and wiring
options.
9 Choose the 2nd Reader. If you have only one card reader, or if you have two card
readers - one on on each side of the door to secure access in both directions -
leave this choice in its default setting (“is not used or provides access in opposite
direction…”). If you are connecting both card readers on the same side of the door,
choose “provides access in same direction as Reader 1 (IN reader)”. If you do not
know the answer, leave this choice in its default setting.

29 Quick Setup
10 The Door will appear in the main Doors viewing area. Four status icons will appear
next – the left-most icon will be a yellow triangle. In the icon legend (lower left part
of the window) a yellow triangle means the Door’s configuration has changed and
needs to be updated. (This is normal for the first-time creation of the Door.)
11 If the icon is a red circle, the system could not communicate with the Door using the
information you provided. If this occurs, please refer to the Troubleshooting section
at the end of this document.

Note If you create or update a Door and you see a red wavy line in a field, hover the
cursor over that field and a message will appear explaining the problem. Correct
the problem and try again.

12 Repeat these steps to create additional Doors.


13 When finished, click ‘Update Modified Doors’ in the Actions menu on the left side
of the window and follow on to Create a Person (Add a User) on page 32.

Choose a Time Zone


1 Choose the time zone in which the controller is physically located. (For most
installations this is the currently selected time zone.)

Choose a Door Behavior


We recommend “Always Locked” as the default behavior.

Selecting two Zones which Border the Doors


1 Choose ‘Inside’ for the ‘Secured (Inside) Zone’.
2 Choose ‘Outside’ for the ‘Unsecured (Outside) Zone’

Choose the Wireless Lockset


1 Choose the MAC Address of your Wireless Lockset that you want to assign the new
door. If you do not see the MAC Address you are looking for, press the ‘Refresh’
button and wait a few seconds.

Note You can find your QEL 200 Wireless Lockset MAC Address on the Wireless Board.
See the QEL 200 Lockset Installation Instructions for complete instructions.

2 Click Create.
3 The Door will appear in the main Doors viewing area.
4 Four status icons will appear next – the left-most icon will be a yellow triangle.
5 In the icon legend (lower left part of the window) a yellow triangle means the

Quick Setup 30
Door’s configuration has changed and needs to be updated. (This is normal for the
first-time creation of the Door.)
6 If the icon is a red circle, the system could not communicate with the Door using the
information you provided. If this occurs, please refer to the Troubleshooting section
at the end of this document.

Note If you create or update a Door and you see a red wavy line in a field, hover the
cursor over that field and a message will appear explaining the problem. Correct
the problem and try again.

7 Repeat these steps to create additional Doors.


8 When finished, click ‘Update Modified Doors’ in the Actions menu on the left side
of the window.

Note At any time you can click on one or more Doors and click the ‘Update’ Action
link to update specific Doors.

31 Quick Setup
Create a Person (Add a User)
1 Click ‘Home’ in upper left part of window to go back to Events Page.

Note These two links, ‘Home’ and ‘Configuration’, take you back and forth between
normal operating mode and configuration mode.

2 Click on the ‘People’ tab to start adding people.


Click ‘Create Person’ in the Actions menu. A pop-up window will appear..

XXX-XXX-XXXX

3 Enter a First Name and Last Name in the appropriate name fields.
4 Enter a Site Code and a Card Code.

Note The Card Code is printed on the card and the Site Code is printed in the
paperwork that came with the cards. If you do not know the Card Code or Site
Code, contact the vendor that manufactured the cards for assistance Copy these
codes into the two fields.

Quick Setup 32
5 Place the Person in a Group.

6 Click the arrow in the Groups tag (or drag & drop) to add a name to the selected
Group (visible below the Card Code boxes).
7 A list of Group names will slide from the left, exposing the only existing Group
(‘Everyone’).

Note To easily find a Group name in a long list of Groups, click the mouse anywhere in
the Available Groups window and start typing the name of the Group. The name
most closely matching will automatically select.

8 Repeat these steps to create each additional Person.


9 Each time you create/update a Person or profile, the Door(s) affected by the Person
change will change their Door Status to a yellow triangle, indicating that the Door
needs an Update.

Note If you create or update a Person and you see a red wavy line in a field, hover
the cursor over that field and a message will appear explaining the problem.
Correct the problem and try again.

10 Change the Admin password.


11 Select the Admin rectangle.

33 Quick Setup
12 Click ‘Edit Person’ in the Actions menu. A pop-up window will appear displaying the
Admin information.

13 Click ‘Role’ to modify Admin user’s credentials.


14 Provide a new Password in both Password fields.
15 Click ‘Save’.
16 You will automatically log out. You may log back in using the new Password.

Quick Setup 34
Import

5
This utility allows you to import data from other systems using a comma-delimited
(CSV) text file. Simply export your third-party access control system’s user data into a
CSV file, then use this utility to import that data directly into Intelli-M. A sample CSV
file is available on the Infinias website that describes the data format information.

Import to Intelli-M Access


1 Go to Start > All Programs > Infinias, Intelli-M Access > Click on the Import Utility.
The utility will display its initial Export Page.

2 Select Import to Intelli-M Access and Click Next.

37 Import
Note The hostname must be local host, meaning that you must be running this utility
from the server onto which you installed Intelli-M. You can use the default
admin username and password if you haven’t changed the credentials yet.

3 Ensure that proper credentials have been entered, and press the ‘Connect’ button
to connect to Intelli-M. If you have trouble connecting to the database, please
contact Infinias Tech Support for further assistance.

Import 38
4 Once you have successfully connected, Click Next button, and an Import User Data
page will appear.

5 Use the File Section button to find the CSV file you created from another system,
and Click Next to display the Begin Data Import Page.

39 Import
6 Click Next to begin the import process. The import process may take a minute or
two, and when finished, will display a Results Page.

Import 40
7 The Results Page breaks the import results into four categories:
1) New Users that were added to Intelli-M

2) Existing Users whose information was updated in Intelli-M

3) Users who for some reason were not added or updated

4) New Groups that were added to Intelli-M

The example results window shows only one new User added, and two new Groups
added. In addition to the results window, a final Task Complete window will also be
displayed.

Press the ‘Finish’ button to exit the utility.

Congratulations! You’ve successfully transferred your users and groups to Intelli-M. All
that you have left to do is to create Access Privileges for your imported groups in the
Rules Page in the Configuration section of Intelli-M. You can refer to Chapter 6 User
Interface for a detailed explanation on how to perform this task, or just jump back to
Chapter 4 Quick Setup for a more streamlined guide.

41 Import
User Interface

7
Page Layout
The Intelli-M user interface is organized into two sections, Home and Configuration. All
users have access to Home, and only Administrators have access to Configuration.

The Home section contains the following pages:

Page What It Does


Events Page Displays events in real-time.
People Page Displays all credential holders in the system. Allows you to
create, modify, and delete People.
Reports Page Displays built-in and custom reports. Generates reports in PDF
format.
Doors Page Displays all Doors. Allows you to create, modify, and delete
Doors.
Schedules Page Displays all Schedules. Allows you to create, modify, and delete
Schedules and Holidays.
Groups Page Displays all Groups. Allows you to create, modify, and delete
Groups.
Peripherals Page Displays third-party devices. Allows you to create, modify and
delete Peripherals.
Customize Page Displays custom fields for People. Allows you to create, modify
and delete custom fields.

All pages (except Login) share a similar layout: Content Area, tabs to change content, a
Views menu and an Actions menu.

Most Content Areas have a paging feature, which will typically display 100 items at a
time, such as People, Groups, Doors, etc.

Features:

• Paging icons are in lower left. Click to move forward/backward through pages of 100
items, or directly enter the page number to view.
• A status text indicator in bottom right of Content Area shows which group of 100
items is currently in view.
• A search text box in upper right of Content Area is available to filter the items in the
view. Only those items that partially or completely match the text you entered will
display. Return to unfiltered view by clearing the contents of the search box.
• A sorting list box in upper right of Content Area allows you to sort by other than Last
name. Sorting choices are determined by which page you are viewing. Some Content
Areas also contain sub-views that provide a different perspective of the current View
(e.g. the Doors Page allows you to view Doors by Zones or by IP and MAC Addresses.)

41 User Interface
Events Page
The first page you will always see when you login is the Events Page.

User Interface 42
The Events Page contains the last 100 events and alarms

Events tagged as an Alarm are highlighted in red, all other events are in default white.

Each Events Page contains five columns, each describe a single aspect:

Page What It Does


Location Describes where the event occurred – typically the name of a
Door or Peripheral.
Full Name Displays the name of the Person who initiated the event (if
known). Many events are generated by the Door or Peripheral. If
a card swipe occurred but the Person is unknown, the site code
and card number will display instead.
From and To Describes the Zone the Person exited (From) and entered (To), if
applicable. These fields contain information only when a Person
passes through a Door with a valid credential.
Event Describes the event, usually in two parts: a general event
description such as Access Denied, and a reason for the event
such as Unknown Card Number.
Date Displays the current Time in which the event occurred. The Date
portion is not displayed, however, you can view the Date of an
Event by hovering your cursor above the Time – the Date will
appear as a tool tip.

Views

The Events Page presents two Views of events:

Page What It Does


Events The default is Events View, showing Events as previously
described.
Muster Muster View displays all the Muster Zones and the People
who used their credentials to gain access to those Zones. Track
cardholders in real-time by identifying important Zones with the
In (or Out) Muster attribute when you create your Zone(s). This
View is where you can track the cardholder movement.

Actions
These are Actions available on the Events Page:

Action What It Does


Pause Events Temporarily stops updating the Events list to prevent the current
list from scrolling off-screen. When paused, the menu title will
change to display Resume Events – click this to resume normal
behavior.

43 User Interface
Track Last Event When enabled, all events generated by a Person (such as a valid
credential swipe) will display the Person’s picture . A checkmark
will appear next to the menu title when the feature is active.

Disable the Track Last Event if you do not have pictures, or if you
do not wish to see pictures appear on events.

Track Last Event is active by default.

User Interface 44
People Page
You create, modify and delete credential holders and users on the People Page.

A Person is a user with an access card to secure areas, or an operator credential (also
known as a Role) to gain login access into the Intelli-M software itself. A Person can
have both types of credentials.

45 User Interface
Views
The People Page allows two different views of credential holders:

View What It Does


Person Displays the first 100 People in the content area, sorted by last
name. Click paging icons in the lower left of Content Area to
change pages.

The search text box will display People whose names or card
numbers match the text you entered. Specifically, the search
string will be matched against the person’s First name, Last
name, Site Code, and Card Number.

The sorting list box can sort by First Name, Last Name, Card
Number, and Card Status.
Groups Displays the first 100 Groups in the content area, sorted
alphabetically.

Click paging icons in the lower left of Content Area to change


pages.

The search text box will display Groups whose names match the
text you entered.

The sorting list box provides no additional sort options for


Groups other than Name.

User Interface 46
Actions
Not all Actions are available for all login privileges. These are the commands you may
perform in Person View:

Create Person (Administrator or HR users only)


1 Click Create Person.

2 Enter at least a First Name, a Last Name, and a Site Code and Card Number. All
other information in this section and the tabbed sections is optional.
3 Click on the Contact tab. Enter Company Name, Job Title, and other contact-related
items

47 User Interface
Badge Tab

1 Click on the Badge tab, which contains a detailed version of the card number
information. It also allows you to activate, deactivate and expire card numbers, as
well as create multiple card numbers for the Person. If you already entered a site
code and card number into the summary section, you’ll see that card entry in the
Badges tab as well.

2 Click Add to create a new Credential and a new entry will be created in the badges
list with mostly empty values. Click the fields you wish to edit and enter the proper
values. You can also update the fields of the first card number in this section.

Note When you create multiple credentials for a Person, all credentials are given the
same access rights. If you need to grant credentials for separate access rights,
simply create a new Person.

3 To give the Person a PIN in a ‘Card + PIN’ scenario, enter a value in the Pin Code
field.
4 To give the Person a PIN in a ‘PIN only’ scenario, do not enter the PIN in the Pin
Code field. Instead, enter the PIN in the Card Code field, using zero (or the keypad’s
default Site Code) for the Site Code field.

Note The Credentials tab is reserved for future use.

User Interface 48
Groups Tab
1 Click on the Groups tab, which allows you to add/remove Groups for this Person.

2 To add/remove Group membership:


3 Click double-right-arrow icon on the left side of the Groups section. (A window will
expand to show all existing Groups.)
4 Drag and drop the desired group to the right to add membership or to the left to
remove membership – or click the double-right-arrow button to add membership or
the double left-arrow to remove membership.
5 Adding a Group means that Person may access all Zones allowed to that Group .

Note To easily find a Group name in a long list, click the mouse anywhere in the
‘Available Groups’ window area and start typing the name of the Group. The
Group whose name most closely matches what you type will be automatically
selected.

49 User Interface
Role Tab
1 Click on the Role tab, which displays login user information. In this section, you can
give a Person login credentials, granting administrator rights.

Custom Fields
Custom Fields is where you provide the values specific to a Person.

To add or change the person’s picture

1 Click on Change Image. A ‘Select Image’ popup will appear.


2 Click ‘Browse...’ and navigate to an image on your hard drive or shared network
drive. Valid image files are GIF, JPEG, and PNG. There is no size limit.
3 Click ‘Preserve aspect ratio?’ If you want to keep the picture’s aspect ratio and
prevent distortion . (When aspect ratio is preserved, there may be black bars on top
or bottom to compensate.)

User Interface 50
Print Badge
1 Click ‘Print Badge’. A dialog will appear.
2 The dialog will show the first Badge design in a drop-down list box, as well as a
rendering of the Badge for that Person.
3 Click ‘Save’ or ‘Print’ to save the badge as a PDF file or send it to a printer. Click
‘Close’ when you are finished.

Note Because the report is generated from the information found in the database,
any changes to the Person’s data, including photo, will not be reflected in the
badge until you have saved your changes by clicking ‘Create’ or ‘Save’.

4 When you are ready to save your entries, click ‘Create’ to create the Person - the
changes will go automatically to all relevant doors.

Edit Person – (Administrator or HR users only)


1 Select a Person then click ‘Edit Person’ – or double click on the Person.
2 An ‘Edit Person’ dialog will appear that is exactly the same as the ‘Create Person’,
except all of the relevant fields will contain that Person’s data. (Refer to the
description of the fields in the Create Person section for information on modifying
the Person’s data.)
3 When you are ready to update the Person, click ‘Create’.
Delete Person – (Administrator or HR users only)

1 Select a Person then click ‘Delete Person’ and a ‘Delete Confirmation’ popup will
appear. If you confirm the Person will be deleted from the system. This change is
sent automatically to all relevant doors to deactivate that Person’s card.

Note Deleting a Person does not remove him from the database. Instead, the Person
is marked as Deleted. This allows you to run reports and view events generated
by the Person before being deleted.

View Person

1 You can view a Person’s information without accidently making changes by


selecting a Person and clicking ‘View Person’.

Print Badge – (Administrator or HR users only)


1 Select a Person then click ‘Print Badge’. This will present the same popup dialog as
when you are creating or editing a Person and click ‘Print Badge’. (Please refer to
the Create Person section for more information.)

51 User Interface
Get Events
1 Select a Person then click Get Events.
2 This dialog displays all events ever generated by this Person, with the first 100
events in a page view.
3 Press the Close button to return to main program.
Groups Page

User Interface 52
Actions (Groups View)

Create Group
1 Click the ‘Create Group’ Action menu item.

2 Enter a name in the ‘Group Name’ text box. (You can create a Group with no
members by clicking ‘Create’ at this time.)
3 Below the Group Name a list of all people will be displayed, showing Card Number,
Employee ID, and a notation of their membership in the Group. You can either click
‘Create’ now, or start adding people to the Group.

Add a Person to a Group


1 Displays a Person’s name, Card Number, picture, and other basic information. Enter
at least a First Name, a Last Name, and a Site Code and Card Number. All other
information in this section as well as the tabbed sections is optional.
2 Double-click the name

53 User Interface
3 Click-and-drag the name to the right column or single-click the name and press the
right arrow button. That Person’s status will be changed to “Adding.”

Note The Person list shows only the first 100 People in the page. Use the paging icons
as you would on other pages to navigate through all People. You can find a
Person on the current page by clicking inside the Person list column and typing
part of the name. The closest match will be automatically selected.

4 When you are finished click ‘Create’.

Note When you create a Group, this information is NOT automatically sent to the
door. You will have to update the Door on the Doors page Configuration section
to send this Group and its members to relevant Doors.

Edit Group

1 Select a Group then click ‘Edit Group’. A dialog will appear that looks exactly like
the Create Group dialog except it will already be populated with the relevant Group
data.
2 Change the Group name, and/or move People in or out of the Group.

User Interface 54
3 When you are done making changes, click ‘Save’.

Note Because this Group already exists, any changes you make to its members will be
sent automatically to the relevant doors.

Reports Page
The Reports Page is where you view and run reports:

Intelli-M uses Microsoft Reporting Services for creating reports. Microsoft Reporting
Services (“Report Server”) is a tool installed as part of Microsoft SQL Server 2008 R2.
A Report in Intelli-M is actually a Microsoft Report Definition (.RDL) file. Each report
shown on the Reports Page is represented by an RDL file that has been published
(transferred) to the Report Server. You can create your own reports by using Microsoft
Report Builder 3.0, a free download from Microsoft’s website.

All reports are generated as a PDF . The only View available is the Reports View. The
only Action available is Run Report.

55 User Interface
Actions

Run a Report
1 Select the desired report then click ‘Run Report’ or double-click the report. A
Report Parameters dialog will appear:

Although each report displays different content, Report Parameters is the same for all
reports.

2 The main content of the Report Parameters dialog will be a list of the first 100
People or Groups, depending on the report selected.
3 You can provide a Start Time and End Time to limit the time range of the report
data, and you can also select one or more People or Groups, depending on the
Report.
4 If you wish to run a report on all People or all Groups, you do not have to click all
items – click on none and ‘all items’ will be assumed.
5 When you are ready to view the report, click ‘Generate Report’. A new window will
appear with the report as a PDF. From that window, you can print the report or save
it as a PDF on your hard drive.

Note If you get a “File Open/Save” popup dialog, then you do not have Adobe Reader
installed. Please install Adobe Reader and re-generate the Report.

User Interface 56
Each built in report contains:

Reporting What It Shows


Audit Log Provides tracking information on the most common
Administrative tasks such as creating, modifying, or deleting
People, Groups, Doors, Zones, etc. for the selected time range.
This report shows only users with Administrator privileges.
Logo Badge Provides tracking information on the most common
(landscape) Administrative tasks such as creating, modifying, or deleting
People, Groups, Doors, Zones, etc. for the selected time range.
This report shows only users with Administrator privileges.
Picture Badge Provides the other view of the built-in Badge reports. This
(landscape) one displays the Person’s image along with other information.
You can modify this report as needed. No time range or other
parameter input is required.
Picture Badge Provides a portrait version of the Picture Badge (landscape). This
(portrait) report displays the Person’s image along with other information.
You can modify this report to make it look as needed. No time
range or other parameter input is required.
Barcode Sample Provides a special report which explains how to add barcode
fields to any report. Run this report to view the example and
instructions. No time range or other parameter input is required.
Cardholder Detail Displays a summary of the Person’s contact information along
with picture and list of all events generated by the Person(s)
during the selected time range.
Event Displays all events generated by the selected Person(s) during
the selected time range.
Group Report Displays all Groups and a list of the members of each Group. No
time range or other parameter input is required.
Privileges Displays a matrix of all Access Privileges in the system, showing
Groups, Schedules and Zones in an access matrix. No time range
or other parameter input is required.
Zones and Doors Lists all Zones with a summary of Doors in each Zone. No time
range or other parameter input is required.

57 User Interface
Doors Page
You lock/unlock a Door as well as view its lock/unlock or open/ close status on the Doors
Page.

The Doors Page shows the first 100 Doors in a page view.

All users are allowed access to this Doors page, which does not provide any Door
configuration capabilities. (To configure Doors, please see the Doors Page description in
the Configuration Section, described later in this chapter.)

User Interface 58
Views
The Doors Page allows two different Views.

View What It Does


Doors View This view displays a list showing summary information about
each Door (including Door Status, which is explained later).

A sub-view drop-down list box in the Content Area allows for


three Door Layouts:

• Grid: This is the default layout. It shows the Door Name, the
‘In’ Zone, the ‘Out’ Zone, and the Door Status icons.
• Condensed: This layout shows only the Door Name and the
Door Status icons in a condensed format. (It provides the
highest number of doors to display in a Content Area).
• Device: This layout shows the Door Name, IP Address, MAC
Address, Serial Number, and Door Status icons in a list format.
Zones View This view has a card format in which each Zone lists all Doors
that border a particular Zone.

Actions (for Doors View)

Action What It Does


Lock All Doors Sends the ‘Lock Doors’ command to all Doors in the system. The
Doors will lock and Door Status icons will change accordingly.
Lock Doors Sends the ‘Lock Doors’ command to one or more Doors you
select. The Doors will lock and Door Status icons will change
accordingly.
Revert to Schedule Sends the ‘Revert to Schedule’ command to one or more Doors
you select, returning them to normal lock/unlock schedule.
Momentary Unlock Sends the ‘Momentary Unlock’ command to one or more Doors
you select, unlocking for a few seconds (typically four).
Unlock Doors Sends the ‘Unlock Doors’ command to one or more Doors you
select. The Doors will unlock, and Door Status icons will change
accordingly.
Get Events Sends the ‘Get Events’ command to one or more Doors you
select to retrieve all Events generated by that Door. A popup
window will appear displaying the first 100 Events. (Use the
usual paging icons to navigate through remaining Events.)

59 User Interface
Actions (for Zones View)

Action What It Does


Lock Doors Sends the ‘Lock Doors’ command to one or more Zones you
select. The Doors will unlock, and Door Status icons will change
accordingly (when viewing the Doors View).
Revert to Schedule Sends the ‘Revert to Schedule’ command to one or more Zones
you select . The Doors will return to their normal lock schedule,
and Door Status icons will change accordingly (when viewing the
Doors View).
Revert to Schedule Sends the ‘Revert to Schedule’ command to one or more Doors
you select, returning them to normal lock/unlock schedule.
Momentary Unlock Sends the ‘Momentary Unlock’ command to one or more Zones
you select to unlock the Door(s) for a few seconds (typically
four). This is the same as a ‘Request To Exit’ Action.
Unlock Doors Sends the ‘Unlock Doors’ command to one or more Zones you
select. The Door(s) will unlock, and Door Status icons will change
accordingly.
Get Events Sends the ‘Get Events’ command to one or more Zones you
select to retrieve all Events generated by the Door(s). A popup
window will appear displaying the first 100 Events. (Use the
usual paging icons to navigate through remaining Events.)

Door Status Icons


Three icon columns represent the various states in which a door can operate:

• Connection
• Lock
• Open/Close

Connection Status
The first icon column displays the connection status of the Door with either a circle icon
or a triangle icon.

Icon What It Represents


Circle Icon Orange Circle: The door is going through initialization,
establishing a connection.

Green Circle: The door is fully operational and the connection is


active. This is the desired idle condition.

Red Circle: The door is offline and the server cannot connect to
the door.

User Interface 60
Triangle Icon Yellow Triangle: A configuration change was made to the system
(such as creating or modifying Access Privileges, creating new
Groups and assigning them to Doors, etc.). You must update the
door to return the icon back to its idle condition of Green Circle.

Blue Triangle: An update is in progress. Intelli-M is preparing the


cardholder configuration data to be sent to the door.

Green Triangle: The update is still in progress and cardholder


data is being sent to the door. You can verify the communication
by watching the prox LED to see if it flashes during the Green
Triangle phase.

Red Triangle: The update operation failed. Try a second time.


If you are still unable to get past the Red Triangle, contact
Technical Support.

Note Cardholder status will be available if you have a valid


‘Credential Management’ Rule visible on the Rules Page.
If you do have a ‘Credential Management’ Rule running,
cardholder access will not be available until status icon
returns to Green Circle. You can create a new ‘Credential
Management’ Rule on the Rules Page.

61 User Interface
Lock Status

The middle icon column displays information about the status of the door lock.

Generally speaking, the lock is either locked or unlocked, but there are other conditions
to consider. Therefore the lock status can be represented by up to seven different icons.

When locked, possible icons are:

Icon What It Represents


Green with The door is locked and is running its normal (un)lock schedule.
Horizontal Bar
Yellow with The door is locked by manual intervention such as clicking ‘Lock
Horizontal Bar Door’ in the user interface, or by a Rule that locks the door.
You can return to normal Blue (or Green, if normal condition is
“locked”) by clicking ‘Revert To Schedule’.
Red with The door is in lock down state and no card access or REX button
Horizontal Bar access will be allowed. You can return to normal Green (or Blue,
if normal is “unlocked”) by clicking ‘Revert To Schedule’.

Gray with The door is locked but undergoing an update process, so the
Horizontal Bar state of the lock cannot be guaranteed.

When unlocked, possible icons are:

Icon What It Represents


Blue with Vertical The door is locked and is running its normal (un)lock schedule.
Bar
Yellow with The door is locked by manual intervention such as clicking ‘Lock
Horizontal Bar Door’ in the user interface, or by a Rule that locks the door.
You can return to normal Blue (or Green, if normal condition is
“locked”) by clicking ‘Revert To Schedule’.
Gray with The door is locked but undergoing an update process, so the
Horizontal Bar state of the lock cannot be guaranteed.

Open/Close Status

The next icon column displays information about the status of the door sensor (if one is
attached).

Generally speaking, the door is either opened or closed, but there are other conditions
to consider. Therefore, the open/close status can be represented by up to six different
icons.

Icon What It Represents


Green with The door is unlocked but undergoing an update process, so the
Horizontal Slit state of the lock cannot be guaranteed.

User Interface 62
Gray with The door is closed but undergoing an update process, so the
Horizontal Slit actual state of the door cannot be guaranteed.
Green “Pac Man” The door is open by a user with valid credential access.

Yellow “Pac Man” The door is open by a user with valid credential access but has
been open too long (typically more than 45 seconds)
Red “Pac Man” The door was forced open without proper credential access,
or was opened from the inside without a motion sensor REX
to notify the Door that someone is exiting, or was held open
beyond 60 seconds.
Gray “Pac Man” The door is open but is undergoing an update process, so the
actual state of the door cannot be guaranteed.

Note You can always hover your cursor over any icon in the icon legend in the lower
left corner of the user interface to see a description of that icon, shown as a tool
tip.

Battery Status

The right-most icon column displays information about the status of the battery.

The battery status icon will show in general terms what percentage of power is left on
the battery. The possible icons are:

Icon What It Represents


Filled Green The battery level is at or near 100%.
Half-filled Green The battery level is between 50% and 100%.
Half-filled Yellow The battery level is low and should be changed soon.
Small Red line The battery level is critical, and may not provide enough power
to engage the lock. Replace the battery immediately.
Filled Gray The battery level is not known at this time.

The Configuration Section is for Administrators only, allowing the Administrator to


create or edit Doors, create or edit Schedules, Behaviors, Peripherals, and Rules. Click
‘Configuration’ in the upper right of the user interface to navigate to the Configuration
section.

63 User Interface
Doors Configuration Page
The Doors Configuration Page lets you create, modify or delete a Door, as well as
update its configuration.

The Doors Configuration Page shows the first 100 Doors in a paged view. Use the
paging icons to see other page views. This Doors Page allows for creating, modifying
and deleting Doors.

Views
The Doors are displayed in a list format, showing summary information about each
Door, including Door Status (explained later). A sub-view drop-down list box in the
Content Area allows for three (do we mean four??) Door Layouts:

View What It Does


Grid Layout This layout shows the Door Name, the ‘In’ Zone, the ‘Out’ Zone,
and the Door Status icons. It is the default.
Condensed This layout shows the Door Name, IP Address, MAC Address,
Serial Number, and Door Status icons in a list format.
Behaviors View This view displays Behaviors in a card format. It includes the
attributes of all Doors assigned to that particular Behavior.
Zones View This view displays the Zones in a card format. Each Zone lists the
names of all Doors bordering it.

User Interface 64
Actions (Doors View)

Create a Door
1 Click ‘Create Door’. A popup dialog will appear.

Name your Door


1 Choose a name appropriate for the main door to your facility (e.g. Front Door,
Lobby Door).
2 Click the IP Address or Serial Number combo boxes to find the IP address of your
main door.
Choose a Door Type

1 If your door has a contact to detect the open/close status of the door, choose door
type listed as “1 or 2 Reader IN1 Normally Closed”.
Choose a Door Behavior

1 We recommend “Always Locked” as the default behavior.

Selecting two Zones which Border the Doors


1 Choose ‘Inside’ for the ‘Secured (Inside) Zone’.
2 Choose ‘Outside’ for the ‘Unsecured (Outside) Zone’.

Choose the Wireless Lockset


1 Choose the MAC Address of your Wireless Lockset that you want to assign the new
door. If you do not see the MAC Address you are looking for, press the ‘Refresh’
button and wait a few seconds.

Note You can find your QEL 200 Wireless Lockset MAC Address on the Wireless Board.
See the QEL 200 Lockset Installation Instructions for complete instructions.

65 User Interface
Delete Door
1 Select a Door and click ‘Delete Door’. A confirmation message box will appear. If
you confirm the Door will be deleted. (The Door is not completely removed from
the system, but marked as ‘Deleted’ so you can run Reports and view Events from
that Door when it existed.)

Note If you are replacing a non-functional controller, do not delete the door and re-
create it. Instead, Edit the Door and change the lockset MAC Address.

Edit Door
1 Select a Door and click ‘Edit Door’ to modify. A popup dialog will appear, similar to
the ‘Create Door’ window except it will have the Doors configuration information.
2 Make the changes you require and press ‘Save’. (The ‘Door Status Connection’ icon
will change to a yellow triangle, indicating that the Door needs to be updated.)

Update Modified
1 Click ‘Update Modified’ to update only those Doors displaying the yellow triangle
icon (which indicates the Door needs an update). The ‘Door Status’ icons will reflect
the proper state during the update procedure. If you have several Doors, you may
see they are updated in bunches of 20 to 60.

Update
1 Select one or more Doors and click ‘Update’ if you wish to update a select few (or
one) Doors at a time, rather than all at once. The Door Status icons will reflect the
proper state during the update procedure.

User Interface 66
Get Events
1 Select a Door and click ‘Get Events’ to retrieve all Events generated by that Door.
A popup window will appear showing the first 100 Events. (The usual paging icons
will help you to navigate through remaining Events.)

Actions (Behaviors View)

Create Behavior
1 Click ‘Create Behavior’ to create a new Door Behavior. A popup dialog will appear.

2 Provide a Name for the Behavior. (This name will appear in the ‘Door Behavior’
drop-down list box in the Create/ Edit Door dialog.)Events. (The usual paging icons
will help you to navigate through remaining Events.)

Choose a Schedule
1 Schedule determines when a Door is locked and unlocked. The Door will be locked
where the Schedule shows white; the Door will be unlocked where the Schedule
shows blue. If no Schedule satisfies this Door’s unlock requirements, you can create
a new Schedule (described later in this chapter).

Choose a Card Mode


1 Select ‘Card Only’.
2 Press ‘Create’ to create your new Behavior.

Edit Behavior
1 Select a Door Behavior and click ‘Edit Behavior’ to modify an existing Behavior.
A popup dialog will appear, similar to the ‘Create Behavior’ dialog with Behavior
information in the fields.
2 Change the configuration items then press ‘Save’ to update your Behavior.

67 User Interface
Note When you modify a Behavior, all Doors configured to use this modified Behavior
will show the Yellow Triangle, indicating they need to be updated.

Delete Behavior
1 Select a Door Behavior and click ‘Delete Behavior’. A confirmation message box will
appear. If you confirm, the Behavior will be deleted.

Actions (Zones View)

Create Zone
1 Click ‘Create Zone’.

2 Provide a name for the Zone. (This name will appear in the drop-down list boxes of
available Zones.)
3 Optionally choose a Muster State. If you want to keep track of all credential holders
who entered this Zone (on the Events Page), choose the “Inside” Muster Zone in the
drop down list box.
4 If you wish to keep track of all credential holders who have exited this Zone, choose
the “Outside” Muster Zone.
5 If you are not concerned about keeping track of movement in this Zone, leave the
default as ‘Unknown’.
6 When finished press ‘Submit’ to create the Zone. The Zone will immediately be
visible in the Content Area and will also be available when creating or modifying
Doors.

Edit Zone
1 To modify a Zone’s name or Muster attribute, select a Zone then click ‘Edit Zone’. A
popup dialog will appear, but with the Zone information in the fields.
2 Make the required changes.
3 Press ‘Submit’ to save changes.

User Interface 68
Note Changing a Zone’s name or Muster state does not have an impact at the Door
controller, therefore Door updates are not necessary.

Delete Zone
1 Select the Zone you wish to delete and click ‘Delete Zone’. A delete confirmation
message box will appear, and the Zone will be deleted after you confirm.

Note If you try to delete a Zone with Doors bordering that Zone, an error message
will appear. First, assign the Doors to other Zones, then delete the Zone.

Update
1 Select one or more Zones and click ‘Update’ if you wish to update all Doors that
border the selected Zones. The ‘Door Status’ icons will reflect the proper state
during update procedure (when in Doors View).

Edit Behavior
1 Select a Door Behavior and click ‘Delete Behavior’. A confirmation message box will
appear and the Behavior will be deleted after you confirm.

Note Door Behaviors can be deleted only when there are no Doors configured to use
this Behavior. Therefore, you might get an error popup dialog indicating one
or more Doors are still utilizing this Behavior. If that happens, assign a different
Behavior to those Doors, then delete the Behavior.

Door Status Icons


The Door Status icons provide status of the Door Connection, Door Lock, and Door
Sensor. Please refer to the Doors Page earlier in this chapter for a detailed description
of the Door Status icons.

69 User Interface
Schedules Page
The Schedules Page in the Configuration Section lets you create, modify or delete a
Schedule, as well as create, modify or delete Holidays within a Schedule. The Schedules
Page is shown:

A Yellow-colored block of time represents an “Active” time block.

For example, the ‘Always’ Schedule has every minute of every day marked in Yellow.

• For a Door, Yellow means the Door is unlocked.


• For a Rule, Yellow means the Rule is allowed to execute.
• For a Person, Yellow means he is granted access (after presenting credentials).
• Likewise, the ‘Never’ Schedule has every minute of every day marked in red.
• For a Door, White means the Door is locked 24 hours a day, 7 days a week.
• For a Rule, White means the rule never runs.
• For a Person, White means he is never granted access, even if credentials otherwise
allow it.

User Interface 70
Views

Schedules View
• Displays the Schedules in a paged list, showing the first 100 Schedules. (The usual
paging icons will help you navigate through remaining Events.)
• Each Schedule is shown as a seven day week.
• Each day has its own row.
• Each day row contains a 24 hour time range from midnight to 11:59:59 PM. (The blue
areas denote the “Active” time range in the Schedule.)

Holidays View
Displays the Holiday Sets in a card format. Each Holiday Set shows the individual Holiday
days contained in a Holiday Set.

Actions (Schedules View)

Create Schedule
1 Click ‘Create Schedule’ . A popup dialog will appear:

2 Choose a Schedule Name relevant to the type of Schedule you are creating (e.g.
‘Office Hours’ for a Schedule that defines a 9 to 5 workday time range.)

71 User Interface
3 Create the Active Time Range. This is a bordering block of time shown in blue that
defines when the Schedule is “Active”. (See properties for blue listed earlier.)
4 Place cursor inside the 24-hour row for the day you wish to modify and drag it to
the end of the time range.
5 A blue rectangle will follow your cursor movement, creating the Active Time Range
in blue.
6 Drag the cursor up or down across rows to fill in blue color across more than one
day at a time.
7 To return a time range to white, click on the blue region to modify and drag your
cursor accordingly.
8 You can also single-click on a time block to change it between blue and white.

Note The smallest increment of a Schedule is 15 minutes.

Edit Schedule
1 To modify a Schedule, click ‘Edit Schedule’. A popup dialog will appear, similar to
the one for ‘Create Schedule’ except its fields will have the Schedule data.
2 Choose a new Schedule name and/or modify the Active Time Range using the
operations described earlier.
3 Click ‘Save’ to save change.
Delete Schedule

Remove a Schedule by clicking ‘Delete Schedule’. A confirmation message box will


appear and the Schedule will be deleted when you confirm.

Note If you add one or more Holiday Sets to a Schedule you should add the same
Holiday Set to all Schedules. For example, if you apply a Holiday Set to a lock
schedule for a Door, you’ll also need to add that Holiday Set to the Schedule
used for cardholder access – otherwise, when a holiday becomes the current
day, the controller will not have a holiday schedule and will deny access with
the Time Schedule error. (You do need to apply Holiday Sets to the Always and
Never Schedules as they will adopt the Holiday Set automatically.

User Interface 72
Actions (Holiday Set View)

Create Holiday Set


1 Click ‘Create Holiday Set’ and a popup dialog will appear:

2 The dialog displays an entire year’s worth of days, starting with the current year.
Press the arrows at the top of the chart to move forward and backward one year at
a time.
3 The purpose of a Holiday Set is to define a list of days whose “Active” time range
(in blue) are identical with each other (e.g. New Year’s Day, Thanksgiving Day, and
Christmas Day).
4 A completely different Holiday Set needs to be created for other Holidays of the
year that do not match the New Year’s Day, Thanksgiving Day, Christmas Day
schedule, but still match each other.
5 Choose a Holiday Set Name relevant to the group of Holidays you add to this Set.

73 User Interface
6 To add a Holiday to the Set, click on a date shown in the year-long calendar. The
date will appear in a list of Holidays on the left pane. You can provide a name for
that Holiday by pressing ‘Edit’ at the bottom of the left pane, or by double-clicking
that holiday in the left pane. When you edit the Holiday, a popup dialog will
appear:

Edit Holiday Set


1 To modify a Holiday Set, click ‘Edit Holiday Set’ and a popup similar to ‘Create
Holiday Set’’ will appear, except holiday information will be in this dialog window.
2 Click on dates in the calendar to add or remove Holidays to/from the Set.
3 Click ‘Edit’ to rename a Holiday or change its date.
4 When finished, press ‘Save’.

Delete Holiday Set


1 Remove a particular Holiday Set by pressing ‘Delete Holiday Set’. A confirmation
message box will appear and the Holiday Set will be deleted after you confirm.

Note If you add one or more Holiday Sets to a Schedule you should add that same
Holiday Set to all Schedules. For example, if you apply a Holiday Set to a lock
schedule for a Door, you’ll also need to add that Holiday Set to the Schedule
used for cardholder access – otherwise, when a holiday becomes the current
day, the controller will not have a holiday schedule and will deny access with
the Time Schedule error. (You do need to apply Holiday Sets to the Always and
Never Schedules as they will adopt.

User Interface 74
Groups Page
The Groups Page in the Configuration Section lets you create, modify or delete a Group,
and add or remove People from a Group.

The Groups Configuration Page provides the same capabilities as the People Page in the
Home section, except Groups View is the default instead of Person View.

75 User Interface
Rules Page
The Rules Page in the Configuration Section lets you manage your Rules.

The Rules Page defines the commands that control the behavior of the Door lockset and
software. These are divided into two types:

Rule What It Does


Door-based Access Privilege is the only Door lockset-based Rule.

Access Privilege is a combination of a Group (“who” has access),


a Zone (“where” the Group has access), and a Schedule (“when”
the Group has access).

You will create one for each Group, Zone, and Schedule
combination. All Access Privileges are downloaded to the
respective Door locksets when you perform the Update Action.
Once downloaded, the lockset will operate using these rules
without assistance from the server.
Host-based All other Rules are considered Host-based Rules.

This indicates that processing of the specified Rule occurs on


the server (or, the “host”). The result may be a command to the
lockset (e.g. “Unlock Zone”), but the decision-making occurs on
the host.

User Interface 76
Views
Only Rules view is currently provided.

Actions

Create Rule
1 Click ‘Create Rule’ to create Access Privileges or Host-based rules for your Door
locksets.

Access Privilege
This provides access privileges for Groups in Zones. The default is an Access Privilege for
the Everyone Group to have access to the “Inside” Zone in the “Always” Schedule.

To create a new Access Privilege:

1 Select ‘Access Privilege’ in the Rule Type drop-down list box.


2 Select a Schedule to determine when Rule is active. (Access is granted everywhere
there are blue-colored blocks in the Schedule.)
3 Select a Group to represent the People who have access to the Zone.

77 User Interface
4 Select a Zone to contain the Door(s) you want the Group to access.
5 Press ‘Create’ to make your new Access Privilege. (It will appear in the Access
Privilege section in the Content Area.)

Note Access Privileges do not take effect until the affected Doors are updated on
the Doors Configuration Page and their ‘Connection Status’ icon changed to a
yellow triangle.

Event Management
The Event Management Rule makes an Event visible in the Events Page. By default, all
Events are visible.

Note To filter out a single Event use the ‘Hide Event’ Rule (described below).

To create a new Event Management Rule:

1 Click ‘Create Rule’ then select ‘Event Management’ in the drop-down list box.
2 Select a Schedule to determine when the Event is visible on the Events Page. It is not
be visible during the inactive time range (the “white” area).
3 Select a Group (optional). If you choose one or more Groups, the Event is visible
only if a member of one of the selected Group(s) generated the Event. If you do not
select a Group, the Event is visible regardless of who generated the Event.
4 Select a Zone (optional). If you choose one or more Zones, the Event is visible only if
the Event occurred in one of the selected Zone(s). If you do not select a Zone, then
the Event is visible regardless of where the Event occurred.
5 Select an Event (optional). All Events you choose is visible. If you do not specify, then
all Events that meet the above criteria are visible.
6 Select an Action (optional). An Action often covers multiples of the Event. All
Actions you choose are visible. If you do not specify, all Events that meet the above
criteria will be visible on the Events Page.

Hide Event
The Hide Event Rule ensures a specific Event are not visible on the Events Page.

To create a new Hide Event Rule:

1 Click ‘Create Rule’ and select ‘Hide Event’ in the drop-down list box.
2 Select a Schedule to determine when the Event is hidden. The Event is not hidden
during the inactive time range (the “white” area).

User Interface 78
3 Select a Group (optional). If you choose one or more Groups, the Event is hidden
only if a member of the selected Group(s) generated the Event. If you do not select
a Group, the Event is hidden regardless of who generated the Event.
4 Select a Zone (optional). If you choose one or more Zones, the Event is hidden only
if the Event occurred in one of the selected Zone(s). If you do not select a Zone, the
Event is hidden regardless of where the Event occurred.
5 Select an Event (optional). All Events you choose are hidden. If you do not specify,
all Events that meet the above criteria are hidden.
6 Select an Action (optional). All Actions you choose are hidden. If you do not specify,
then all Events that meet the above criteria are hidden on the Events Page.

Alarm Management
The Alarm Management Rule turns any Event into an Alarm and shows on the Events
Page in red.

There are five default Alarm Management Rules to manage all Access Denied event
possibilities.

To create a new Alarm Management Rule:

1 Click ‘Create Rule’ and select ‘Alarm Management’ in the drop-down list box.
2 Select a Schedule to determine when this Rule is active. (Events that meet this rule’s
criteria will convert into Alarms only during the Active Time Range (blue) part of the
Schedule.)
3 Select a Group (optional). If you choose one or more Groups, the Event converts into
an Alarm only if the Event was generated by a member of the Group(s). If you do
not select a Group, then qualifying Events generated by all Groups convert into an
Alarm.
4 Select a Zone (optional). If you choose one or more Zones, the Event converts into
an Alarm only when the Event occurs in the selected Zone(s) . If you do not select a
Zone, then qualifying Events in all Zones convert into an Alarm.
5 Select an Event (optional). All Events you choose convert to an Alarm. If you do not
specify, then all Events that meet the above criteria convert into an Alarm.
6 Select an Action (optional). All Actions you choose will be converted to an Alarm,
provided the Action also meets the criteria specified above. If you do not specify an
Action, then all Events that meet the above criteria will be converted into an Alarm.

Credential Management
The Credential Management Rule handles any scenario where a cardholder should have

79 User Interface
access but is denied (e.g. the controller was offline during the credential download).

Note This Rule will not download credentials that do not belong on the lockset.

To create a new Credential Management Rule:

1 Click ‘Create Rule’ and select ‘Credential Management’ in the drop-down list box.
2 Select a Schedule to determine when this Rule is active. Qualifying Events convert
into Alarms only during the Active Time Range (blue) part of the Schedule you
select.
3 Select an Event (optional). All Events you choose evaluate the cardholder’s access
rights. If you do not specify, then all Events that meet the above criteria are
evaluated (not recommended).

Email Event
The Email Event Rule sends an email to one or more recipients based on information
you provide.

To create an Email Event Rule:

4 Click ‘Create Rule’ and select ‘Email Event’ in the dropdown list box.
5 Select a Schedule to determine when this Rule is active. Events that satisfy this rule’s
criteria generate an email to selected recipients.
6 Select a Group (optional). If you choose one or more Groups, the email is sent
only when a member of those Group(s) generates the Event. If you do not select a
Group, the email is sent regardless of who generates the Event.
7 Select a Zone (optional). If you choose one or more Zones, the email is sent only
when the Event occurs at a specified Zones. If you do not select a Zone, the email is
sent regardless of where the Event occurs.
8 Select a Door (optional). If you choose one or more Doors, the email is sent only
when the Event occurs at a specified Door. If you do not select a Door, the email will
be sent regardless of where the Event occurs.
9 Select an Event (optional). All Events you choose are emailed to the recipient list.
If you do not specify, all Events that meet the above criteria are emailed to the
recipients
10 Select an Action (optional). All Actions you choose are emailed to the recipient.
If you do not specify an Action, all Actions that meet the above criteria will be
emailed to the recipients.
11 Select a Target Group. Select at least one Group from the list. All members of the

User Interface 80
Group(s) you select will be emailed, as specified in their Person profile. Members of
the Group(s) who do not have email addresses will not receive emails.

Lock Zone
• The Lock Zone Rule locks all bordering Doors in a specified Zone. All Access Privileges
continue while locked. The lock is permanent until another action (such as ‘Revert to
Schedule’ or ‘Unlock Zone’) unlocks it.
• The Lockdown Zone Rule is similar, except all Access Privileges are blocked (i.e. no
valid card or fob swipes nor REX requests).
• The Unlock Zone Rule is similar, except it unlocks all Doors in specified Zone(s).
• The Revert Zone Rule is similar, except it reverts the Zone’s Doors to their Scheduled
lock state.
To create one of these Rules:

1 Click ‘Create Rule’ and select the desired Rule in the drop-down list box.
2 Select a Schedule to determine when this Rule is active.
3 Select a Group (optional). If you choose one or more Groups, the Zone’s Doors are
locked only when a member of the Group(s) generates the Event. If you do not
select a Group, the Zone’s Doors are locked regardless of who generates the Event.
4 Select a Zone (optional). If you choose one or more Zones, the Zone’s Doors are
locked only when the Event occurred at a specified Zone. If you do not select a
Zone, the Zone’s Doors are locked regardless of where the Event occurred.
5 Select a Door (optional). If you choose one or more Doors, the Zone’s Doors will
be locked only when the Event occurred at one of the specified Doors. If you do
not select a Door, the Zone’s Doors will be locked regardless of where the Event
occurred.
6 Select a Reader (optional). If you choose one or more card Readers, the Zone’s Doors
will be locked only when the Event occurred at the specified Reader(s). If you do
not select a Reader, the Zone’s Doors will be locked regardless of where the Event
occurred.
7 Select an Event. Choose one or more Events that will cause the Zone’s Doors to be
locked. The Doors will lock when the specified Event occurs and the above criteria is
met.
8 Select a Target Zone. Select one or more Zones where Doors will be locked when
the qualifying Event occurs and the above criteria is met.

81 User Interface
Edit Rule
To modify an existing Rule:

1 Click ‘Edit Rule’, and a popup dialog will appear. It is similar to the ‘Create Rule’
dialog except with ‘Edit Rule’ information.
2 Make the necessary changes.
3 Press ‘Save’ to update the existing Rule.

Note If the modified Rule is an Access Privilege, all Doors affected by the Access
Privilege will show a yellow triangle (indicating the door needs an update). All
other changes will be reflected immediately.

Delete Rule
To remove a Rule, click ‘Delete Rule’ and a confirmation message box will appear. The
Rule will be deleted after you confirm.

Note If the deleted Rule is an Access Privilege, all Doors affected by the Access
Privilege will show a yellow triangle (indicating the door needs an update).

Peripherals Page
A Peripheral Device is a third party product or service. The Peripherals Page in the
Configuration Section lets you manage your Peripheral Devices:

User Interface 82
Peripherals allow the software to communicate with an external device, product, or
service. Intelli-M supports three Peripheral Types by default: the Web Page, Generic
Peripheral, and the Ethernet I/O Module.

Other Peripheral Types can be added by installing more plug-ins. (Contact Tech Support
for more information.)

Views
The Peripherals Page supports only the Peripherals View.

Actions

Create Peripheral
1 Click ‘Create Peripheral’ and a popup dialog will appear:

2 The Create Peripheral Dialog is split into two sections: the list of existing devices (in
the left pane), and the configuration of an existing device (the right pane).
3 Create a Peripheral by choosing an existing device in the left pane. (You cannot
create a Peripheral until it is visible in the left pane.)
4 Some plug-ins (such as the ethernet I/O device) automatically appear in the left
pane. However, some you must add manually.
5 If your device doesn’t appear in the list, first manually add a device into the list,
then create it as a Peripheral (see more information below).

83 User Interface
Create a new Web Page
The Web Page Peripheral allows you to enter the URL of any web page. This web page
can then be displayed in a web browser after you create a Rule to show it.

This Peripheral is commonly used to display live video of an IP video camera at the client
browser.

Create a Generic Peripheral


The Generic Peripheral is similar to the Web Page Peripheral, except it is designed to call
a Web Service rather than a Web Server.

Use the ‘Forward Event’ Rule template to create Rules that send the determined Events
to a third-party system. (For more information, call Tech Support.)

Manually Add a Device


1 Click ‘New’ to see a menu of devices you can manually add.

Each plug-in has its own custom configuration user interface displayed in the ‘Create
Peripheral’ dialog. Because of this, separate documentation exists for each plug-in.

Configure an Existing Device


1 To configure an existing or manually added device, select it from the list in the left
pane. A configuration page customized for that device will appear in the right pane,
along with a Peripheral Name.
2 If you selected a manually added device then modify the ‘Name’ field to match the
Peripheral Name,

User Interface 84
3 Click ‘Create’ at the bottom. This finalizes the process.

Note If you select a device you did not manually add, it may be discovered but is not
yet configured to your specifications. Before you press ‘Create’, configure the
device using its custom configuration page, shown in the right pane. Press the
‘Save’ (or ‘Update’) first. After you configured the device, select it again in the
left pane and press ‘Create’– otherwise you’ll create a Peripheral that doesn’t
match your needs. (If this occurs, refer to the ‘Edit Peripheral’ section below.)

4 Once you press ‘Create’ the device will disappear from the discovered devices list in
the right pane, and will appear in the Content Area of the Peripherals Page.

Edit Peripheral
1 You can modify the created Peripherals using Edit Peripheral.
2 Click ‘Edit Peripheral’, and the Edit Peripheral popup dialog will appear. It is
identical to the ‘Create New Peripheral’ dialog, except the custom configuration
page for the specified Peripheral is visible.
3 Make your necessary changes.
4 Press ‘Save’ (or ‘Update’) found at the bottom of the device configuration user
interface. Do not press the ‘Create’ button at the bottom of the dialog.
5 When the configuration is complete, the dialog will be empty – click ‘Cancel’ to
close it.

Delete Peripheral
1 To remove a Peripheral, click ‘Delete Peripheral’ and a confirmation message box
will appear. The Peripheral will be deleted after you confirm.

Note When the Peripheral is deleted, the device reappears in the discovered devices
list. You may create the Peripheral again from this list.

Settings Page
The Settings Page in the Configuration Section lets you manage Custom Settings for a
Person.

A Setting has no pre-defined purpose in Intelli-M. The reason for a Setting is so you
can create your own Person attributes that are missing from the Intelli-M Access Person
fields.

Views

85 User Interface
There is only one view supported: the Settings View.

Actions

Create Field
1 Click ‘Create Field’ and a popup dialog appears.

Field Name
1 Enter the name of the Setting here. It will appear in the ‘Custom’ tab of the Create/
Edit Person dialog. Every Custom Field you create will be visible in the Create/Edit
Person dialog.

Edit Field
1 To modify a Custom Field’s name, select the field and click ‘Edit Field’. A dialog will
appear with the Field Name filled.
2 Make your changes.
3 Press ‘Update’ to save.

Delete Field
1 To remove a Custom Field, select the field and click the ‘Delete Field’.
2 A confirmation message box will appear. It will be deleted after you confirm.

System Settings Section


The Configuration Section also contains the System Settings, which include various
global configuration options.

License Entry Tab


Displays the Intelli-M Version number, along with the license information.

Email Settings Tab


Allows you to input SMTP Server information for sending Emails on Events.

Security Settings Tab


Controls the level of system security you specify. An example displaying the system
defaults:

User Interface 86
Require SSL
Intelli-M supports SSL (Secure Sockets Layer) encryption between all web browsers and
the web server. Enabling this feature means everyone must use https:// instead of http://
to communicate with the software.

SSL communication requires a valid digital certificate. Intelli-M creates a non-trusted


digital certificate which causes the typical certificate warning message.

Click ‘Continue to this website (not recommended).

Disable Web Mode on Controllers


If you are concerned about undesired access to the lockset, you can either change
the lockset’s admin password (described below), or disable the web server entirely by
checking this box.

Note this feature applies only to the eIDC door controller.

Encrypt Controller (Lockset) Communications


Encrypts data that passes between the Stanley server and all eIDCs when you check this
box.

Note this feature applies only to the eIDC door controller.

Controller (Lockset) Admin Password


Displays the default password for the eIDCs and allows you to change it.

Note This is not the Admin password, but the password used for connecting to the
eIDC’s web server using your web browser. Changing this password field will
change every lockset managed by Intelli-M. Any locksets currently offline will
not have their password changed. This feature applies only to the eIDC door
controller.

Intelli-M API Password

Displays the password used internally by Intelli-M to process and finalize Events. (More
information in Chapter 3 - Terms and Concepts.) We recommend you change this
password from its default.

87 User Interface
Troubleshoot

7
Installation Errors

Windows update causing a .NET error during installation


Re-install .NET Framework 3.5. (And .NET 4.0 if you have that as well. If .NET 4.0 is not
installed, you do not need to install.)

1 Open Control Panel and double click ‘Programs and Features’ (Windows XP users,
double click ‘Add/Remove’).
2 Select.NET Framework 3.5 entry.
3 Press ‘Repair’. (If you do not see ‘Repair’, click ‘Uninstall/Change’ and you’ll see an
option to repair the installations.)
4 Follow the instructions to complete the Repair process.
5 Reboot your computer. (You must reboot the computer to fully resolve the problem
even though the system will not prompt a reboot.)
6 If you have .NET 4.0 Framework installed, it might not appear in the Applications
list– it may be in the Windows Features list (click ‘Turn Windows Features On/Off’ in
the left pane of the Programs and Features window). If you find .NET 4.0 in that list,
uncheck the .NET 4.0 box, let it uninstall, then check the box to re-install. Reboot
the computer to complete the repair.

Window says that one of the prerequisites could not be installed


The Stanley Intelli-M Prerequisite Manager should automatically install Internet
Information Servers (IIS) and Microsoft Message Queuing (MSMQ).

However, several scenarios may prevent this:

1 If you have ‘User Account Control’ enabled and fail to run the installation as
‘Administrator’
2 You are running Windows XP and not providing the necessary Windows installation
media
3 Your system needed a reboot but was unable to automatically restart the computer
In any of these cases, follow instructions in the window to resolve. If still unable to
resolve, contact Tech Support.

SQL Server installation failed, and I was asked whether or not to


continue the installation.
1 Click ‘No’ to stop the installation. (If you already clicked ‘Yes’ you can stop the
installation if it’s still running – or uninstall it from the Control Panel.)

89 Troubleshoot
2 Once the system returns to its pre-installed state you can view the SQL Server install
log files to determine the cause of the problem.
3 The log files are found in the “C:\Program Files\Microsoft SQL Server\100\Setup
Bootstrap\Log” folder.
4 Inside that folder will be another folder with a name in a semi-readable form of
time and date that the installation was attempted. The format of the folder name
is: “<this year><two-digit-month><two-digit-day>_<six digit time>”. (An example
of this would be “20090601_102434.”)
5 Go into the folder whose name represents the most recent installation attempt.
6 Once inside the most recent SQL installer log file folder, there will be two files
to inspect (even though there might be many files in the folder). These two
files also have cryptic names, formatted as “Summary_<computer_ name>_
<install_folder_name>_GlobalRules.txt” and Summary_<computer_name>_<install_
folder_name>_ Component Update.txt.” There may not be a summary file with the
“ComponentUpdate.txt”.
7 Open the file whose name contains ‘GlobalRules’ first.
8 The top of the file has a bock of text with the label ‘Overall Summary’. In that text
block, you’ll see the various result codes that occurred and an ‘Exit Message’ with a
description of what caused SQL Server installation to fail.
9 If this file shows no errors near the top, then open the file whose name contains
‘ComponentUpdate.’
The most common problem is when the system has a pending reboot which has not yet
occurred. To resolve, reboot the computer then restart the software installation.

Page Errors

The Events have stopped working. Events do not update.


An Event must go through several processes before it is finalized. Some of these
processes can fail, but all Events are stored in the database and can be retrieved.

One issue that can prevent an Event from being finalized is that one or more of the
Intelli-M services are not running.

To verify:

1 Open the Control Panel and double click ‘Administrative Tools’,


2 Double click ‘Services’ and a Windows Services list will appear.
3 Find the four Intelli-M services and make sure all four are running.

Troubleshoot 90
4 If they are not, reboot the system to verify the services can restart.
5 If the problem persists, contact Tech Support.
6 Another possibility is a firewall that blocks ports internal communication. Intelli-M
requires ports 80, 18776, 18777, 18779 and 1433 be unblocked for proper operation.
The installation procedure should open these ports automatically.
To test a firewall issue:

1 Temporarily disable the firewall and see if Events start appearing again.
2 If they do, create firewall exceptions to open the above ports, then turn on firewall.
3 There may be a credentials issue. Necessary credentials are stored internally but
could possibly get out of sync.

Clicking on the Reports Page results in an error message or page is blank.


The reports were published to Microsoft Reporting Services when you installed.
Sometimes an issue may prevent the reports from being published.

To check for this issue:

1 Open a browser window and navigate to http:// localhost/reports_sqlexpress.. (If


using Windows XP, navigate to %20Http:// localhost:8080/reports_sqlexpress.)
2 After a minute you should see a mostly-white page with a link that looks like
Stanley Reports. If you do not, it means the reports were not successfully published.
In that case, run the installation again.
3 If the reports link is visible, the issue is likely database permissions. In this case, run
the installation again.
If running the installation a second time does not resolve either issue, contact Tech
Support.

91 Troubleshoot
Glossary

8
This chapter provides a glossary of Events and their descriptions. These Events are
typically viewed on the Events Page in the application. They are also visible to use as
filters for creating Rules on the Rules Page.

Events are dynamic, which means new Event Types can be generated at runtime by
Intelli-M or a third-part device/plug-in. This document describes only Event terms that
are initially created upon installation.

Event Category
This field describes the basic type of Event which occurred. The default Event Category
names and categories are:

Access Control
This is the most common category. The majority of Events generated within Intelli-M
come from eIDC modules which generate Access Control category events. This Event
would be some form of an Access Control Event.

Schedule Change
This category defines all events related to a change in a Schedule.

External Event
This category defines all Events generated outside Intelli-M, including any events
generated by Peripherals.

Event Action
This field describes the Action which took place as a result of an Event’s occurrence.
This field appears on the Events Page outside the parentheses. The default Event Action
names and descriptions are:

Granted
Means permission to access the entity (whatever it may be) was accepted. In the context
of an Access Control Event Category, this would mean access was granted by the system
to access a Zone (e.g. a Door).

Denied
Means permission to access the entity (whatever it may be) was denied.

93 Glossary
Restricted
Means the Door returned to normal lock schedule – which means the door is once again
locked. If the door is in an unlock schedule, this message will not appear – it occurs only
when there is a return from an unlocked condition to its normally-scheduled locked
condition.

Status
Status message is sent by the door to notify Intelli-M the status of an input, output, LED
or door tamper has changed. This is a very common message because in a single Access
Control Event of swiping a card, opening a door and closing a door, one or more inputs
has changed – possibly more than once. (Further details on what actually changed is
contained in the remainder of the Event data.)

Door Opened
Detects a door was opened through door sensor input changing status. (See ‘Status’ for
an explanation of Status events.)

Door Closed
Detects a Door returned to its normal condition (closed) through door sensor input.

Schedule Change
The eIDC sends this message when it enters or leaves a lock schedule – which will cause
the Door to enter/leave the unlocked state.

Event Reason
The Event Reason type contains the highest degree of detail about the Event. This field
appears in the Events Page inside the parentheses. The default Event Reason names are:

Initializing
This is generated when Intelli-M is starting up and beginning to communicate with the
Doors. This Reason is usually followed by the Online or Offline Event Reason codes.

Online
When Intelli-M finishes initializing a door, it sends an Event with the Online Event
Reason – this means the door is fully configured and initialized.

Glossary 94
Offline
If Intelli-M fails to initialize the door it sends an Event with the Offline Event Reason.
This usually happens when the eIDC is not available on the network.

Normal
This occurs when the door sends Status messages related to inputs or outputs, and
when the condition is not an alarm or abnormal condition. This Event Reason is very
common.

Request to Exit
This occurs when someone pushed a REX button granting access to the Door. This
Reason is usually associated with a Grant Event Action.

Request to Unlock
This occurs when a user clicks the ‘Unlock Door’ action in the user interface.

Request to Lock
This occurs when a user clicks the ‘Lock Door’ action in the user interface.

Left Open
This occurs when the Door is still open from a valid Access Grant after a pre-determined
timer on the eIDC expires. The default time expiration is 45 seconds, so in the default
state you will see this Event Reason displayed after 45 seconds of holding the Door
open.

Forced Open
This occurs when the Door is opened without a valid Access Grant. While this is usually
considered an Alarm condition, it may occur when there is no REX button on the inside
of the door. In this situation, people simply opening the door on their way out will
break the door sensor and generate the Forced Open Event. This can be masked with a
physical REX – or, more commonly, with a motion sensor REX input.

Override Action
This Reason is generated when an input or output’s state is forced to its active
condition. (For example, a normally-closed output will be overridden when it is

95 Glossary
forced to be opened.) This can occur when a Rule forces an output open or closed (or
energized/de-energized) based on the Rule’s filter.

Input 1 Active
This Reason, along with Input 2 Active, Input 3 Active, and Input 4 Active, occurs when
that particular input changes from idle to active state. The active state of a normally-
open input is closed, and the active state of a normally-closed input is opened.

Input 1 Inactive
This Reason, along with Input 2 Inactive, Input 3 Inactive, and Input 4 Inactive, occurs
when that particular input changes from active to idle state.

Output 1 Active
This Reason, along with Output 2 Active and Relay Active, occurs when that particular
output changes from idle to active state. The active state of a normally de-energized
output is energized (12v power applied), and the active state of a normally-energized
output is off (0v). The active state of the normally-open Relay is closed, and the active
state of the normally-closed Relay is open.

Output 1 Inactive
This Reason, along with Output 2 Inactive and Relay Inactive, occurs when that
particular output returns to its idle state.

Starting/Started
These Reasons occur when the Data Access Services is in its start-up procedure. The
Started Event Reason occurs when the Data Access Service is fully initialized and
running.

Schedule Active
This Reason is generated when the Access Schedule becomes active. A Schedule is active
at the beginning of the “blue” region in the UI for that Schedule.

Schedule Inactive
This Reason is generated when a Schedule becomes inactive. A Schedule is inactive at
the end of the “blue” region in the UI for that Schedule.

Glossary 96
Schedule Active in Minute
This Reason is generated one minute prior to the Schedule becoming active. This is
generally used to set up a condition which must be running at the moment of the
Schedule Active Event.

Schedule Inactive in a Minute


This Reason is generated one minute prior to the Schedule becoming inactive.

Valid Credential
This Reason is generated when a valid card swipe, key fob swipe or fingerprint scan is
recognized by the door. It is always associated with some form of Access Granted.

Unknown Credential Status


This Reason is generated when a valid card swipe, key fob swipe or fingerprint scan
is not recognized by the door. While the scan may produce a valid ID number, it may
not be present in the eIDC database – as a result, access is not granted. It is always
associated with some form of Access Denied.

Credential Expired
This Reason is generated when a valid card swipe, key fob swipe or fingerprint scan is
recognized as expired ID number. It is always associated with an Access Denied event.

Credential Not Yet Active


This Reason is generated when a valid card swipe, key fob swipe or fingerprint scan is
recognized as an ID number which will be active in the future. It is always associated
with an Access Denied event.

Anti-Passback Violation
This occurs when a credential that was recently granted access tried a second time to be
granted access on the same side of the Door. A Soft Anti-Passback is associated with an
Access Granted, while a Hard Anit-Passback is associated with an Access Denied.

Device Tamper
This is generated when the tamper input on the door detects some type of intrusion.

97 Glossary

S-ar putea să vă placă și