- Page 3 and 4: Operating OptionsSet System Options
- Page 6 and 7: LocksLock PropertiesMulti-Key Mode
- Page 9 and 10: About This ManualThis manual is int
- Page 11: About CyberAudit-Web ProfessionalVi
- Page 14 and 15: The rechargeable battery charges in
- Page 16 and 17: CommunicatorsExpired keys need to b
- Page 18: USB IR EncoderThe CyberKey IR Encod
- Page 23 and 24: CyberAudit-Web Professional Credits
- Page 25 and 26: Either party may cancel this Licens
- Page 27 and 28: d) The agents, employees, distribut
- Page 29 and 30: CyberLocksTable Fields:This page al
- Page 32 and 33: What is a Tag?In CyberAudit-Web, a
- Page 34 and 35: SchedulesSchedules allow keys to op
- Page 36 and 37: Holidays"Holidays," which do not ha
- Page 38 and 39: Granting Access to Locks - Access i
- Page 40 and 41: The Keyword filter supports pattern
- Page 42 and 43: CyberKeysThree types of CyberKeys a
- Page 44 and 45: CyberKey Product InfoCyberKeys are
- Page 46 and 47: System Key PropertiesIf a system ke
- Page 48 and 49: Vault 20 FXSingle Key Vault
- Page 50 and 51: ConventionsThis chapter describes s
- Page 52 and 53: MenusCyberAuditWeb - Professional u
- Page 54 and 55: The Present IconThe present icon, ,
- Page 56 and 57: The List FilterList Filters are a c
- Page 58 and 59: System SetupThis chapter contains i
- Page 61 and 62: CyberAudit-Web Professional Data So
- Page 63 and 64: Access Code SourceAccess codes are
- Page 65 and 66: Add the Grand Master by introducing
- Page 67 and 68: Place the Grand Master's IR in fron
- Page 69 and 70:
Login and PasswordCyberAudit-Web re
- Page 71 and 72:
5. Enter the user name and password
- Page 73 and 74:
Upgrading from CyberAudit - Web Lit
- Page 75 and 76:
The Access Matrix will be shown and
- Page 77 and 78:
Setting Access ControlTo set access
- Page 79 and 80:
BackupsA backup of the database is
- Page 81 and 82:
Remote AccessCyberAudit-Web may be
- Page 83 and 84:
Backup OptionsCyberAudit-Web automa
- Page 85 and 86:
Matrix OptionsLock OptionsKey Optio
- Page 87 and 88:
Multikey - Different SchedulesThis
- Page 89 and 90:
People and Key OptionsThis page set
- Page 91 and 92:
Fixed period expiration rules - The
- Page 93 and 94:
master keys. For example if a maste
- Page 95 and 96:
Disable keys when event memory beco
- Page 97 and 98:
Communicators OptionsThis page enab
- Page 99 and 100:
Portable LinksName - Name assigned
- Page 101 and 102:
USB Station informationStation Ligh
- Page 103 and 104:
The CyberLock Flex SystemThe CyberL
- Page 105 and 106:
RFID Reader - For scanning 13.56 MH
- Page 107 and 108:
Flex System Keyport - For programmi
- Page 109 and 110:
The CyberKey Vault 20 FXThe CyberKe
- Page 111 and 112:
LAN Authorizer Product DescriptionT
- Page 113 and 114:
Spreadsheet Import -Most spreadshee
- Page 115 and 116:
System AdministratorsCyberAudit-Web
- Page 117 and 118:
Edit LoginLogin - The identifier of
- Page 119 and 120:
Associated Person - New PersonUse t
- Page 121 and 122:
Set date and time optionstrim audit
- Page 123 and 124:
Web Authorizers
- Page 125 and 126:
Related Topics:Adding Web Authorize
- Page 127 and 128:
CyberAudit-Web URL - The IP address
- Page 129 and 130:
4. Verify that the CyberAudit-Web s
- Page 131 and 132:
Web Authorizer Keyport MessagesWeb
- Page 133 and 134:
2. The letter 'X' indicates theocte
- Page 135 and 136:
3. With the USB Flash Drive inserte
- Page 137 and 138:
81 memory full82 memoryrestored8384
- Page 139 and 140:
109attempting keyfirmwareupgradekey
- Page 141 and 142:
MessageREADYREADY *DescriptionMessa
- Page 143 and 144:
MessageSYNC...LOAD HUBFIRMWARESOFTW
- Page 145 and 146:
2-Key Inputs for Web AuthorizersSev
- Page 147 and 148:
Web Authorizer DiagnosticsThe Web A
- Page 149 and 150:
Portable Links, Stations, and Cyber
- Page 151 and 152:
CyberLinkCyberLink is a program wri
- Page 153 and 154:
Using CyberLink as an RFID Card Rea
- Page 155 and 156:
Communicator Issue NumbersCommunica
- Page 157 and 158:
Portable Link PropertiesThis page e
- Page 159 and 160:
Adding a Comm LinkCyberAudit-Web ca
- Page 161 and 162:
USB Station ListThis page lists the
- Page 163 and 164:
USB Station PropertiesThis page ena
- Page 165 and 166:
Additional Links:Adding StationsCyb
- Page 167 and 168:
Related Topics:Adding StationsCyber
- Page 169 and 170:
Busy Flashing, Ready Flashing -Web
- Page 171 and 172:
4. For Web Stations, networking inf
- Page 173 and 174:
View Communicator Audit DataEnter b
- Page 175 and 176:
information fromThe Grand Master is
- Page 177 and 178:
Flex System Hub ListThis page lists
- Page 179 and 180:
Delete - Removes the selected Flex
- Page 181 and 182:
eturned and for audit trail reports
- Page 183 and 184:
Go to:Options for Adding Flex Syste
- Page 185 and 186:
About Groups and Display LinksThe G
- Page 187 and 188:
There are three categories of Flex
- Page 190 and 191:
RFID ReaderMore than one RFID reade
- Page 192 and 193:
Using the Data Knob and DisplayThe
- Page 194 and 195:
GeneralName - The name assigned to
- Page 196 and 197:
Programming Flex System Hubs from a
- Page 198 and 199:
5. With power applied to the Flex S
- Page 200 and 201:
FeatureLarge diameter moduleWeather
- Page 202 and 203:
Flex System Demo ModeDemo Mode enab
- Page 204 and 205:
LED Indicator on the Weatherized Va
- Page 206 and 207:
Flex System Power RequirementsThe F
- Page 208 and 209:
Flex System Module Cable PinoutCat
- Page 210 and 211:
Messages at setup and administratio
- Page 212 and 213:
KEYREADYKEYADDITIONDENIEDKEYASSIGNE
- Page 214 and 215:
Flex System Audit Trail Events1 Sys
- Page 216 and 217:
36373839404142Data receivedfrom I/O
- Page 218 and 219:
87888996Mission numbernot foundNo s
- Page 220 and 221:
2821028211Low batterydetectedCritic
- Page 222 and 223:
33#Displays the current date, time,
- Page 224 and 225:
When the diagnostic file is capture
- Page 226 and 227:
Resetting a Flex HubResetting a Fle
- Page 228 and 229:
LAN Authorizers
- Page 230 and 231:
Related Topics:Adding LAN Authorize
- Page 232 and 233:
Remote Modem - Communicates with th
- Page 234 and 235:
6. CyberAudit-Web will immediately
- Page 236 and 237:
3. Give the LAN Authorizer and keyp
- Page 238 and 239:
The present iconThe present icon, ,
- Page 240 and 241:
53 power-on resetPower was restored
- Page 242 and 243:
===============================Addi
- Page 244 and 245:
Primary Local Authorizer - This dro
- Page 246 and 247:
Configuration where Local Modem Aut
- Page 248 and 249:
SyncSelect "Sync" from the Lan Auth
- Page 250 and 251:
Authorizer Modem MessagesTopMessage
- Page 252 and 253:
Key Records in AuthorizersAll Autho
- Page 254 and 255:
CyberKey VaultsVault 20 FXSingle Ke
- Page 256 and 257:
Power Over Ethernet (POE) for Vault
- Page 258 and 259:
Email Notification Settings for Vau
- Page 260 and 261:
Vault 20 FX OverviewThe CyberKey Va
- Page 262 and 263:
Firmware - Indicates the version nu
- Page 264 and 265:
Power Requirements for Vault 20 FXT
- Page 266 and 267:
Steps:PowerConnect power and Ethern
- Page 268 and 269:
In the Add new Flex Hub page,Enter
- Page 270 and 271:
Programming a Vault 20 FX from a US
- Page 272 and 273:
5. Open the frontpanel of the Vault
- Page 274 and 275:
7. Return the frontpanel to the Vau
- Page 276 and 277:
Valid Keys for Vault 20 FXThe Cyber
- Page 278 and 279:
Vault 20 FX Demo ModeUntil it has b
- Page 280 and 281:
99#: not used in demo mode00#: exit
- Page 282 and 283:
Single CyberKey VaultsThis page lis
- Page 284 and 285:
Single CyberKey Vault PropertiesNam
- Page 286 and 287:
Single CyberKey Vault Audit TrailsA
- Page 288 and 289:
Adding a Single CyberKey VaultFollo
- Page 290 and 291:
5. Click on the Vaultrecord in the
- Page 292 and 293:
Single CyberKey Vault Status Indica
- Page 294 and 295:
1.2.What is a "Valid" CyberKey for
- Page 296 and 297:
Miscellaneous Notes about Single Cy
- Page 298 and 299:
System KeysSystem keys are a specia
- Page 300 and 301:
Grand MastersThe Grand Master Cyber
- Page 302 and 303:
CyberLock ProgrammerThe CyberLock P
- Page 304 and 305:
Reset KeyA reset key is available f
- Page 306 and 307:
Steps to Add System KeysSubsystem k
- Page 308 and 309:
Grand Master Will Open Locks and Pr
- Page 310 and 311:
Lost System KeysClick here for inst
- Page 312 and 313:
7. Update the Programmer Key or Gra
- Page 314 and 315:
Lost Base Grand MasterFollow these
- Page 316 and 317:
Lock PropertiesThis page displays t
- Page 318 and 319:
Add a Lock Manually1. Click on the
- Page 320 and 321:
5. Update the CyberLock Programmer
- Page 322 and 323:
1. to theAdd the Grand MasterCyberA
- Page 324 and 325:
1. Place a serial number label on t
- Page 326 and 327:
Importing Lock DataCyberLocks and C
- Page 328 and 329:
2. Change the name field to reflect
- Page 330 and 331:
Programming JobsProgramming Jobs ar
- Page 332 and 333:
Programming Job PropertiesThe Job N
- Page 334 and 335:
4. Choose whether to have the Job d
- Page 336 and 337:
Downloading a CyberLock with a Cybe
- Page 338 and 339:
Steps to Reset CyberLocksCyberLocks
- Page 340 and 341:
Reset LockChecking the "Reset" chec
- Page 342 and 343:
Lock Properties - TagsUse the item
- Page 344 and 345:
Lock TagsLock tags are used to grou
- Page 346 and 347:
People Access - Generates a report
- Page 348 and 349:
Replace LockOne lock may be replace
- Page 350 and 351:
Programmed or DownloadedThis column
- Page 352 and 353:
CyberPointsA CyberPoint is an elect
- Page 354 and 355:
To remove all filters, click on the
- Page 356 and 357:
DoorsThis chapter describes Doors a
- Page 358 and 359:
Additional Topics:The Flex System D
- Page 360 and 361:
Open Time (seconds) - The number of
- Page 362 and 363:
Door PropertiesPropertiesName - A n
- Page 364 and 365:
Adding and Configuring a DoorTo be
- Page 366 and 367:
Adding Modules to a Flex HubDoor Ta
- Page 368 and 369:
The Flex System Door and I/O module
- Page 370 and 371:
Terminal Output PatternsA Door and
- Page 372 and 373:
Door and I/O Module PropertiesThis
- Page 374 and 375:
View Audit Trail Data for DoorsView
- Page 376 and 377:
Door TagsDoor tags are used to grou
- Page 378 and 379:
Door Tag PropertiesA Door tag's nam
- Page 380 and 381:
Alternatively, bulk access may be g
- Page 382 and 383:
PeopleThe People section of CyberAu
- Page 384 and 385:
- Creates a printable list of the p
- Page 386 and 387:
People DetailsProperties for a peop
- Page 388 and 389:
Adding People and Keys1. People can
- Page 390 and 391:
7. Update the KeyUpdate through iss
- Page 392 and 393:
Fields are read in the following or
- Page 394 and 395:
People TagsPeople tags are used to
- Page 396 and 397:
People Tag PropertiesA tag's name c
- Page 398 and 399:
CyberKeysThis section contains info
- Page 400 and 401:
Replace KeyThe Replace operation in
- Page 402 and 403:
Assigning Master Key AccessFollow t
- Page 404 and 405:
Lost KeysThis page enables designat
- Page 406 and 407:
3. Select the This key is Lost opti
- Page 408 and 409:
8. Touch thelocksdesignated asdisab
- Page 410 and 411:
How to Mark a Key as Not Lost and R
- Page 412 and 413:
5. Update the locks that were set a
- Page 414 and 415:
Lock to DownloadCyberKeys with prod
- Page 416 and 417:
Note: CyberKey issue numbers, vault
- Page 418 and 419:
Lost Keys ListThis page is the list
- Page 420 and 421:
Updating a Key by Issue Number1. Th
- Page 422 and 423:
Updating a Key1. The key holder mus
- Page 424 and 425:
View Audit Trail Data for CyberKeys
- Page 426 and 427:
791011121314Master keyauthorizedPro
- Page 428 and 429:
48257Hardwaremismatch -access denie
- Page 430 and 431:
Updating CyberKey FirmwareUpdating
- Page 432 and 433:
RFID Access CardsRFID Access cards
- Page 434 and 435:
Supported RFID Access CardsVidex®
- Page 437 and 438:
3. Click Apply4. Scan an unassigned
- Page 439 and 440:
Schedule PropertiesSchedules should
- Page 441 and 442:
Adding Holidays1. To add a holiday,
- Page 443 and 444:
Set a CyberLock as a CyberPointAssi
- Page 445 and 446:
3. Type in a descriptive name such
- Page 447 and 448:
Combining SchedulesWhen this page o
- Page 449 and 450:
Schedule IconsIcons can be added to
- Page 451 and 452:
Matrix OptionsDisplay Settings -To
- Page 453 and 454:
Automatic Tagging gives the most be
- Page 455 and 456:
ReportsReports are an extremely pow
- Page 457 and 458:
Delete - Removes the selected repor
- Page 459 and 460:
4. The report is configured by choo
- Page 461 and 462:
Included PeopleUse this form to sel
- Page 463 and 464:
Included CommunicatorsWhen the All
- Page 465 and 466:
Edit Report EventsEvents refers to
- Page 467 and 468:
Included ColumnsChanging options in
- Page 469 and 470:
Event sorting in reportsThe order o
- Page 471 and 472:
Notifications
- Page 473 and 474:
Audit Trail EventsJournal of Change
- Page 475 and 476:
Follow these steps to add notificat
- Page 477 and 478:
Journal of Changes
- Page 479 and 480:
Filter on what was changed permits
- Page 481 and 482:
Details - The details button will b
- Page 483 and 484:
Date/Time PreferencesDate order, se
- Page 485 and 486:
Backup and RestoreTo create a new b
- Page 487 and 488:
Using Locks and KeysThis section co
- Page 489 and 490:
Standard CyberKey Battery Cap Remov
- Page 491 and 492:
Beeper and LED Flash Patterns for C
- Page 493 and 494:
How to manage Lithium-ion polymer b
- Page 495 and 496:
CyberLock Cleaning InstructionsWith
- Page 497 and 498:
CyberPoint User Tips1.2.3.4.5.6.Con
- Page 499 and 500:
GlossaryAccess Code An access code
- Page 501 and 502:
Control Key A type of CyberKey that
- Page 503:
Portable Link A remote communicatio