- Page 3 and 4: Operating OptionsSet System Options
- Page 6 and 7: LocksLock PropertiesMulti-Key Mode
- Page 10 and 11: IntroductionThank you for using Cyb
- Page 13 and 14: CyberKeysCyberKeys contain four lev
- Page 15 and 16: At the same time, the lock checksth
- Page 17 and 18: CyberKey Authorizers are durable an
- Page 20 and 21: CyberAudit-Web Professional uses me
- Page 22 and 23: How-To'sAdd:CyberKeysCylindersDoors
- Page 24 and 25: CyberAudit-Web Professional License
- Page 26 and 27: 7.2 ExclusionsTHE LIMITED WARRANTY
- Page 28 and 29: ConceptsDefines the hardware compon
- Page 30: 1.2.- Creates a printable list of t
- Page 33 and 34: one for its route and one for its s
- Page 35 and 36: No Access - The No Access schedule
- Page 37 and 38: The Access MatrixThe CyberAudit-Web
- Page 39 and 40: Menu OperationsColumn MenuRow MenuF
- Page 41 and 42: Related Topics:How-To'sLock TagsMat
- Page 43 and 44: CyberKey ComparisonThese keys can b
- Page 45 and 46: CyberKeys have memory that contains
- Page 47 and 48: CommunicatorsCommunicators are a co
- Page 49 and 50: CyberAudit-Web System HelpCyberAudi
- Page 51 and 52: CyberAudit-Web Context HelpContext
- Page 53 and 54: Change IconA change icon, , indicat
- Page 55 and 56: The CyberAudit-Web Item Chooser Con
- Page 57 and 58: Wildcard RulesAn astrisk "*" means
- Page 59:
CyberAudit-Web Installation KeyDefi
- Page 62 and 63:
New DatabaseThe next decision is re
- Page 64 and 65:
Passwords from Manual InputsEnter m
- Page 66 and 67:
Passwords from a Grand MasterThe so
- Page 68 and 69:
CyberLink - The program that commun
- Page 70 and 71:
Upgrading from CyberAudit Professio
- Page 72 and 73:
Import WarningsCyberAudit-Web requi
- Page 74 and 75:
Update the Grand Master used in the
- Page 76 and 77:
1.2.3.4.5.Getting StartedThis secti
- Page 78 and 79:
Update each key using either the En
- Page 80 and 81:
Audit ReportsAudit Reports are used
- Page 82 and 83:
Email SetupEmail server: - CyberAud
- Page 84 and 85:
Operating OptionsThe preferences se
- Page 86 and 87:
Lock OptionsIf CyberLocks will be p
- Page 88 and 89:
Re-key All LocksRe-keying CyberLock
- Page 90 and 91:
Disable the key's IR - CyberKeys us
- Page 92 and 93:
Expiration RulesExpiration is an im
- Page 94 and 95:
Master Keys in CyberAudit-WebA Cybe
- Page 96 and 97:
Door Access NumbersA Door Access Nu
- Page 98 and 99:
and communicating with CyberAudit-W
- Page 100 and 101:
USB StationsThe USB Station is used
- Page 102 and 103:
Web AuthorizersThe CyberKey Web Aut
- Page 104 and 105:
Flex System HubAt the heart of the
- Page 106 and 107:
Data Knob - Used with the Data Disp
- Page 108 and 109:
Additional Topics:Adding a Flex Sys
- Page 110 and 111:
Single CyberKey VaultThe Single Cyb
- Page 112 and 113:
Audit Data TrimmingCyberAudit-Web a
- Page 114 and 115:
Reactivate the SoftwareReactivating
- Page 116 and 117:
Administrator LoginsEach CyberAudit
- Page 118 and 119:
Add a New AdministratorCyberAudit-W
- Page 120 and 121:
Administrator PermissionsIn CyberAu
- Page 122 and 123:
CommunicatorsCommunicators are a co
- Page 124 and 125:
Web AuthorizersA CyberKey Web Autho
- Page 126 and 127:
Web Authorizer DetailsName - Name a
- Page 128 and 129:
Setting Up Web AuthorizersWeb Autho
- Page 130 and 131:
1.2.Resetting a Web AuthorizerReset
- Page 132 and 133:
Configuring a Web AuthorizerThere a
- Page 134 and 135:
If any of these conditions are true
- Page 136 and 137:
Web Authorizer Audit Trail Events#
- Page 138 and 139:
99 watchdogrestart100 database erro
- Page 140 and 141:
Web Authorizer Keyport MessagesMess
- Page 142 and 143:
UPGRADESUCCESSBUSY8 DIGITSLINKUPHOS
- Page 144 and 145:
Messages at StartupMessages when Id
- Page 146 and 147:
The Present IconThe present icon, ,
- Page 148 and 149:
If a Web Authorizer reaches CyberAu
- Page 150 and 151:
Comm LinksComm Links in CyberAudit-
- Page 152 and 153:
CyberLink Result CodesCyberLink get
- Page 154 and 155:
Then with a CyberKey Vault or a Cyb
- Page 156 and 157:
Portable Links ListThis page lists
- Page 158 and 159:
IR EncoderThe IR Encoder is a USB-t
- Page 160 and 161:
6. If the device was added using an
- Page 162 and 163:
Related Topics:Adding StationsCyber
- Page 164 and 165:
Web Station ListThis page lists the
- Page 166 and 167:
Web Station PropertiesSerial - An i
- Page 168 and 169:
Station Light DefinitionsReady Blin
- Page 170 and 171:
Adding a New StationBoth USB Statio
- Page 172 and 173:
6. If adding a USB Station, skip th
- Page 174 and 175:
Comm Link Audit Trail Events# Event
- Page 176 and 177:
The Flex System
- Page 178 and 179:
Memory Used - The amount of availab
- Page 180 and 181:
View/Edit Flex Hub ModulesView the
- Page 182 and 183:
Module Conflict IconA module confli
- Page 184 and 185:
3. Enter a name for the hub plus th
- Page 186 and 187:
The Edit Flex Hub Modules page enab
- Page 188:
About Groups and Display LinksFlex
- Page 191 and 192:
Keypad DisplayMore than one keypad
- Page 193 and 194:
Flex System Hub Properties
- Page 195 and 196:
Open Vault - There may be occasions
- Page 197 and 198:
3. Click Go.CyberTransfer will pull
- Page 199 and 200:
Mounting Flex System ModulesThe fol
- Page 201 and 202:
Hole dimension for small diameter m
- Page 203 and 204:
Using CyberKeys with Flex System We
- Page 205 and 206:
Using the Data Knob and DisplayThe
- Page 207 and 208:
Weatherized VaultThe Weatherized Va
- Page 209 and 210:
The Molex® Mini Jr Series Connecto
- Page 211 and 212:
UNKNOWNCARDLINKUPHOSTUNKNOWNMISSION
- Page 213 and 214:
LINKUPHOSTKEYDISABLEDNOKEYRETURNKEY
- Page 215 and 216:
15Data written toUSBDrive ID, File
- Page 217 and 218:
555758596061626567IHS inputrejected
- Page 219 and 220:
113114115116117Modulefirmware updat
- Page 221 and 222:
Flex System Special Key InputSpecia
- Page 223 and 224:
Flex System Hub DiagnosticsFlex Sys
- Page 225 and 226:
Flex System Hub LED IndicatorsThe F
- Page 227 and 228:
3. Connect the other end of the pat
- Page 229 and 230:
LAN AuthorizersThe CyberKey LAN Aut
- Page 231 and 232:
LAN Authorizer DetailsName - Name a
- Page 233 and 234:
Adding a LAN Authorizer1. Select "L
- Page 235 and 236:
Setting Up LAN AuthorizersClick her
- Page 237 and 238:
Resetting a LAN AuthorizerResetting
- Page 239 and 240:
LAN Authorizer Audit Trail Events#
- Page 241 and 242:
Working with Modem AuthorizersModem
- Page 243 and 244:
===============================Addi
- Page 245 and 246:
Configuration where Local Modem Aut
- Page 247 and 248:
Configuration where Remote Modem Au
- Page 249 and 250:
Keyport Messages Generated by LAN A
- Page 251 and 252:
READINGWRITINGKEYREADYINSERT KEYLOW
- Page 253 and 254:
Vaults
- Page 255 and 256:
Granting Access to CyberKey VaultsP
- Page 257 and 258:
Email Notification Settings for Cyb
- Page 259 and 260:
Vault 20 FX
- Page 261 and 262:
Vault 20 FX PropertiesGeneralName -
- Page 263 and 264:
Open Vault - There may be occasions
- Page 265 and 266:
Setting Up and Configuring a Vault
- Page 267 and 268:
Since the Vault 20 FX is fundamenta
- Page 269 and 270:
Insert the USB Memory Stick into th
- Page 271 and 272:
3. Click Go.CyberTransfer willpull
- Page 273 and 274:
6. With powerapplied to theVault 20
- Page 275 and 276:
Push Notification PortBoth Flex Sys
- Page 277 and 278:
The key ID is not issued to another
- Page 279 and 280:
Removing KeysScan an RFID card or e
- Page 281 and 282:
CyberKey Vault 1
- Page 283 and 284:
Notification - Enables setting up a
- Page 285 and 286:
2.Email Notification for CyberKeys
- Page 287 and 288:
612 Mission denied706707Card access
- Page 289 and 290:
2. Connect the CyberKeyVault to the
- Page 291 and 292:
8. You may insert aCyberKey in the
- Page 293 and 294:
KeyPresentOff when the Vault cannot
- Page 295 and 296:
Single CyberKey Vault TonesTone/Sig
- Page 297 and 298:
System KeysSystem Keys have special
- Page 299 and 300:
Comm Log - Generates a report of ke
- Page 301 and 302:
AnchorThe Anchor icon,for the subsy
- Page 303 and 304:
USB ProgrammersThe USB Programmer i
- Page 305 and 306:
Adding and Editing System KeysAdd a
- Page 307 and 308:
4. Select the type of System Key. C
- Page 309 and 310:
Grand Master Will Program LocksA Gr
- Page 311 and 312:
3. Click the "Save" button.4. The d
- Page 313 and 314:
9. Update the Programmer Key or Gra
- Page 315 and 316:
LocksThis section describes functio
- Page 317 and 318:
Multi-Key Mode and Open Delay Setti
- Page 319 and 320:
3. Place a serial number label on t
- Page 321 and 322:
To add locks with a Grand Master:Ad
- Page 323 and 324:
2. Place a serial number label on t
- Page 325 and 326:
2. Now, the Programmer contains the
- Page 327 and 328:
Naming Locks1. Once the Grand Maste
- Page 329 and 330:
Programming LocksProgram locks by:U
- Page 331 and 332:
Related Topics:CommunicatorsDownloa
- Page 333 and 334:
Steps to Create a Programming Job1.
- Page 335 and 336:
6. Touch the locks.7. Update the Pr
- Page 337 and 338:
Click on the "This lock or CyberPoi
- Page 339 and 340:
3. Check the "Reset" checkbox and c
- Page 341 and 342:
Change Icon Report for CyberLocksA
- Page 343 and 344:
Locks Bulk EditWith "Bulk Editing"
- Page 345 and 346:
People with Access - The number of
- Page 347 and 348:
Lock Tag PropertiesA tag's name can
- Page 349 and 350:
View Audit Trail Data for CyberLock
- Page 351 and 352:
Communication LogsWhen a CyberLock
- Page 353 and 354:
CyberPoint ListThis page displays t
- Page 355 and 356:
CyberPoint PropertiesThis page disp
- Page 357 and 358:
Doors in CyberAudit-WebA Door in Cy
- Page 359 and 360:
The Doors Listing PageThis page all
- Page 361 and 362:
Operations:- Click this button to c
- Page 363 and 364:
The Doors Listing PageAudit Trails
- Page 365 and 366:
Click SaveConfiguring a DoorTo full
- Page 367 and 368:
Suspending the Keep-Unlocked Schedu
- Page 369 and 370:
The Door and I/O module consists of
- Page 371 and 372:
Global Terminal Output PatternsCybe
- Page 373 and 374:
Additional Topics:Doors in CyberAud
- Page 375 and 376:
Audit Trail for DoorsDoor audit tra
- Page 377 and 378:
Additional Topics:Doors in CyberAud
- Page 379 and 380:
Granting Access to DoorsFollow the
- Page 381 and 382:
Email Notification for Door Left Op
- Page 383 and 384:
PeopleThis page displays informatio
- Page 385 and 386:
People TagsTagsUpdating Keys
- Page 387 and 388:
Person section:Name - The person's
- Page 389 and 390:
4. Click "Apply."5. There are sever
- Page 391 and 392:
Importing Personnel DataPeople reco
- Page 393 and 394:
People and Keys Bulk EditThis page
- Page 395 and 396:
Clicking the link in the "Locks wit
- Page 397 and 398:
People with this TagPeople that don
- Page 399 and 400:
Issue NumbersAn issue number is a u
- Page 401 and 402:
Change Vault Access NumberVault Acc
- Page 403 and 404:
Change Icon Report for CyberKeysA C
- Page 405 and 406:
Designating a Lost Key with Disabli
- Page 407 and 408:
6. The key is now marked as lost an
- Page 409 and 410:
10. The change icons will clear for
- Page 411 and 412:
3. Select the This key is not Lost
- Page 413 and 414:
CyberKey Behavior SettingsCheck off
- Page 415 and 416:
How to Issue a CyberKey to a Person
- Page 417 and 418:
4. Update the Key or check one out
- Page 419 and 420:
Steps to designate a lost key and p
- Page 421 and 422:
4. When prompted, enter the issuenu
- Page 423 and 424:
4. The change icon is now cleared i
- Page 425 and 426:
Audit Trail Events from CyberKeysCy
- Page 427 and 428:
19Access Denied- NoPermissions20 Ke
- Page 429 and 430:
CyberKey Communications LogThe Comm
- Page 431 and 432:
4. Present the key to the IREncoder
- Page 433 and 434:
RFID Access CardsCyberAudit-Web use
- Page 435:
Steps to Assign an RFID Access Card
- Page 438 and 439:
Schedule Access/ExpirationThe Acces
- Page 440 and 441:
Add or Edit HolidaysEnter the holid
- Page 442 and 443:
CyberAudit-Web Global SchedulesCybe
- Page 444 and 445:
Adding SchedulesHolidays are "excep
- Page 446 and 447:
Schedule Time FramesA schedule time
- Page 448 and 449:
Matrix SymbolSchedules should be gi
- Page 450 and 451:
Setting Schedules in the Access Mat
- Page 452 and 453:
CyberAudit-Web Professional can aut
- Page 454 and 455:
Reports, Notifications, and the Jou
- Page 456 and 457:
ReportsPeople, events, dates and lo
- Page 458 and 459:
Adding ReportsFollow these steps to
- Page 460 and 461:
Report PropertiesReports may be cus
- Page 462 and 463:
Included Locks and CyberPointsUse t
- Page 464 and 465:
Included DoorsTo add Doors to the r
- Page 466 and 467:
Date FilterA range of selections ar
- Page 468 and 469:
Download Date- The date and time th
- Page 470 and 471:
Report OutputQuick View - Outputs H
- Page 472 and 473:
Email NotificationsNotifications ar
- Page 474 and 475:
Notification PropertiesNotification
- Page 476 and 477:
Example Report
- Page 478 and 479:
Journal of ChangesThe journal of ch
- Page 480 and 481:
Journal of Changes Report ColumnsTh
- Page 482 and 483:
Management / MaintenanceArticles in
- Page 484 and 485:
Log FilesLog Files are used to trou
- Page 486 and 487:
Steps to Restore a CyberAudit-Web P
- Page 488 and 489:
Tips for Using a CyberKeyConduct a
- Page 490 and 491:
Rechargeable CyberKey LED Flash Pat
- Page 492 and 493:
Battery lowOne flash per 10secondsO
- Page 494 and 495:
DisposalLithium-ion batteries shoul
- Page 496 and 497:
CyberKey Cleaning InstructionsVisua
- Page 498 and 499:
Glossary of Terms
- Page 500 and 501:
Master Key Schedule A special sched
- Page 502 and 503:
Lock Programming Devices CyberLock