Knowledgebase

Communication Logs

  • 0

..//assets/img/kb/date.png Communication Logs

/assets/img/kb/lockDownloadInfo.jpg

When a CyberLock or CyberPoint is downloaded, a record is kept of the download "session." The session information is viewable from the Communications Log.

  • Date and Time Downloaded by CyberAudit-Web - This is the date and time that CyberAudit-Web pulled the audit trail data from the CyberKey, Grand Master, or CyberLock Programmer and recorded it in the system.
  • Key - The CyberKey, Grand Master, or CyberLock Programmer that downloaded the lock.
  • Records Added to the Database - A CyberLock holds up to the most recent 1100 events in its memory. This memory is never cleared but the oldest record is overwritten. If the count of records reported in this field is near 1100 events, it is likely the older records have been overwritten with the newer ones. This count will never report exactly 1100 because:
    • Some records in the lock's memory are used to store the date of the resulting date and time.
    • Records with identical key IDs, timestamps, and audit trail events are only recorded once in the database.
  • Lock is Programmed - Indicates whether the lock has been secured with access codes. If no information was captured when the lock record was written, this field will be blank.
  • Access Codes - Indicates which access codes have been programmed into the lock.
    • 1 - The lock contains a system code. This indicates the locks came from a system where manual passwords were entered or secure-random codes were generated.
    • 2 - The lock contains an access code. All programmed locks will contain this code.
    • 3 - The lock contains a secondary access code.
    • If there is no 1 this indicates the locks came from a system where a Grand Master was the source of the access codes such as CyberAudit-Web Professional.
      If this information was not captured when the lock record was written, this field will be blank.
  • Lost Keys - The number of individual lost keys currently programmed into the lock. If this information was not captured when the lock record was written, this field will be blank.
  • Mode/Delay - Indicates whether multiple keys are required or a delay has been set in the lock. If this information was not captured when the lock record was written, this field will be blank.
  • MKDS - Indicates whether a multi-key setting requires each key present a different schedule. If this information was not captured when the lock record was written, this field will be blank.
  • Access Count - The CyberLock increments this counter each time it authorizes a CyberKey to open it. This can be an indicator of the number of openings the CyberLock has had over its life.

Was this answer helpful?