WSE • 3/21/97 16720 — 9 SE 6000 Security Management System
c. The Audit Trail implementation shall include reporting on the information that affects
keyholder access and alarm events, including the following files:
1) Keys holders.
2) Pollers.
3) Devices.
4) Readers.
5) Points.
6) Holidays.
7) Access Groups.
8) Access Codes.
9) Employee Access Assignments.
10) Time Codes.
11) Instructions.
12) Auto Opens/Activates.
13) Device Reports PIN Definition
14) PIN Hardware Definition.
15) Dialers.
16) All SQL database items.
d. The audits for these files shall be stored in an independent flat file resident outside of the
database.
e. The audit trails shall contain all fields of the affected record, not just the field that was
changed. in order to provide a "before and after" image of the data.
f. The File Maintenance programs of each of the affected files shall be modified to log the audit
records to the flat file.
g. A report shall be provided for each of the audit files, and shall print all of the fields of the
audit record in addition to the date and time of change, the log-in name of the user making
the change, a serial number identifying the line of audit, and whether the change was a
modify, add or delete.
h. Each Audit file shall be able to be archived to tape. Once the audit record is successfully
written to tape, the on-line audit record shall be deleted.
10. Event and Task Programming:
a. Custom programming, to define a set of tasks to be performed as the result of a specific event,
shall be achieved through the Event and Task programming option.
b. Events such as an access event, alarm condition, or timer may be linked to an output. The
capability for this level of customization is standard on the SE 6000 system.
c. The creation and implementation of special Event / Task relationships depend upon careful
definition of customized transactions under a resident program facility.
d. One Event is capable of driving one, or multiple, Tasks.
e. Event / Task would be implemented to activate certain alarms or indicators any time a
specific event took place at a critical point in the facility.
f. Example: If a Command Key which is not valid is presented at a critical door, a special alarm
message can be programmed to appear at the monitor screen while, simultaneously, lights
and audible alarms are activated at the site of attempted entry.
Comentarios a estos manuales