Use Access Control Logs To Constrain Coronavirus

By Brian Rhodes, Published on Apr 09, 2020

Access control users have included capabilities that are not commonly used that can help zero-in and discover potential Coronavirus hotspots in a facility: system activity logs.

IPVM Image

Getting this data requires tight access system configurations, which can give integrators an opportunity to consult or sell end-users on optimizing their systems and using access logs.

Inside this note, we discuss how to do this on any access system and which data is needed to make it happen. We also examine automated exposure reports from Genetec and Detrios.

Risk ********** ********** *** ********** ****, '*********' ***********

**** ***********, ***** **** shuttered ***** **** ********* working **** ****, ***** 'essential' ********** ****** *****, like ******* *** *********, food *** ********** ********, and ******** **************.

*** ***** '*********' **********, knowing *** **** ***** and *** **** **** potentially ********** **** ******* especially ******** *** *********** risk *** ***** ** direct ************ *** ******** first ** **** *** spread.

Access ******* ******* ****** **** ************

***** **** ***-***** *** considering ******** ********* ******* ********** ** combat ***********, ***** ** * good ****** **** ******* have ** ********* **** not ***** *** ** full ***: ****** ******* logs.

***** ****** ****, ************ to **** *** ***** people **** **** *** who **** **** **** in ******* **** ***** avoid *** ****, ***********, and ****** ****** ** quarantining *** ******* *** cleaning ** ** ****** facility, ********** *** *******-******** buildings **** *********.

****** **** ******* * disruptive '********/** *******' ****** for ******** **** *** limit ** ******** *** assets *** *********, *****-*********** the ******** *** ************ of ** ******** ********** offers * **** ********* and ******** **** *** countermeasures.

**** ****** ******* ******* a ****** **** **** example, **** ***** ***** badges *** **** ** specific *******/ ********* ** a ********:

IPVM Image

***** ******* ** ***** response ****** ******* *** narrow ********* ** *****/********* specific ***** ******** *** test * ******** ********** group ** ******.

***** **** ** ******* monitor * ******* ****** of ****** **** ******** risks **** ****** **** down ** ****** *********** vital ******** ***** ***** unneeded ******* ***** *********.

*** ****** **** ********* ******** **** ** disinfecting ****** ******** *** monitoring **** *********** ** just * *** ********* zones.

Access ****** ********* ****

* *** ******* ** access ******** ******** ******* ****** *** Schedules**** *** ******* ****** where * ********** ****** is ******* ** * facility.

**** **** *******, '** Tech' **** **** *****, the ******** ** **** allowed ****** *** *** door *** * ******** room. **** **** *********** to *****/******** **** ***** areas:

IPVM Image

***** '****** & *********' ***** ********* *** only ***** ****** ** areas **** ****.

** *** ******* *****, for * ********* ****** like ***********, ** ******* non-IT ******** ********* ** the ******** **** ****, but ***** *** ** logs ******* ***** *********** with ** ****** **** areas ******** ** **** example ******, ***** ************ can ** ***** ***.

Visitor ********** ****** **** ***

** ********* ** ***** logs ** ***-********* ********** holders, **** **** ********, can ** ******** ******* using****** ******* ********** *******.

*** ************* ** ******** individuals ** * ******** or ****** *** *** they ******** **** ** essentially *** ******* **** of *** ******:

IPVM Image

*****, ****** **** * potentially ******** *** ******** 'global **********' ********-**** ******** that *** ******** **** visitors ** *********** **** delivery *******, ******** ********** systems **** ******** ****** the **** ** **** for *********.

Multi-Building ******* **********

********** **** ******** ***** different ********* ** * campus, **** ******* ******** or ******* ********, ***** able ** ******* ********* everywhere ** ******** ****** has **** ** * benefit ** ******* **** potential *********.

Risk: ********* ********* *** ** ********

***** ******* ****** ** used ** ******* ********** for *********** ********* *****, but ***** ******* *** only ******* ********** ******* infections *** ****** ******* the ****** ****** ******* it.

* ******** ** **** if ****** ***** *** infected *** *** ********** people ** * ***** group ********* ***** **** can *********** ****** **** without ******* *****, *********, or ******* ** ***.

** ***** *****, ** infected *************, *********** ***********, ** ********* ********* existing ****** ******** *** enter ** **** ** contact ****** ******* ** the ******'* *******, **** method **** *** ****** it.

Integrators *** **** *****/******

**** *********** *** ************ **** **** ** customers **** *** **** amidst ********* *** ******* uncertainty, *** ******** *** to *** ***** ******* can ** *** ***** details ** *** ***** time *** ***-***** ********** Coronavirus.

**** ** *** **** already ********* ** ******* in ** ****** ****** may ** ******* ** not ******** ** ***-***** unless *********** **** ** show **** *** ** use **.

******** ***-***** *** ** use **** **** *** not **** * ******** in *** ****, *** now ********** *** ****** closure ** * ******** versus *** ********* ** just * *** ****** might ** ************* ******** detail **** *********** *** pitch ** ***-***** ***** able ** *******.

Using ****** **** ******* ***********

* *** ****** ** keep ** **** *** integrators ********* ***** ** a ********* *********** **** management ****:

********* **** **** *******: ******* ****** *** of ****** **** ** not ****** ******** ***** to ********* ***** ****** systems. ** ***** *** for * '****' ** 'flat' ****** ****** ****** that ***** ***** ********** into *** **** ** they ******, *** ******** of ******* *** *** possible ** *** ******* reduced.

** ***** *** ***** 'flat' **************, ****** ** becomes *** ***** **** an ********** *** ***** to ****, **** ********** the ******* ****** ******.

*******-**, *******-***: ** ***-***** ** not******** ****** ******* *******, *** ********** ****** is ********* **** *** or ******** ***********. *** system ******* ************* **** valuable *** ******* **** worthless.

********** ****:******* ***** ** ******** log ******** ** *** possibility ** * ****** user ******* * **** open *** ******** ****** entering ** ******* ** area. **** ******** ** access ****** **** '***********' access ** ***. ** note *** **** ***** of *** ***** ************: ****** ******* *********** ******* *** ********* polite ******** *** ******** be * ******* ******** threat.

************ *****: *********, *** ***** door ** ******** ** an ****** ******* ******, and *** ** ************ or ********* ** ***** uncontrolled ********. *** **** of ***** ***** ***** means *** ****** ****** could ** ******* ********* but *** ********** *** intended **** ** ******* a ******** ****** *** potentially ******* ** ******** people *** ***** ** area ******* ********** ** the ******.

**, ****** *** ******, it ******* ***** **** an ************ **** ** putting ** ****** ******** at ****, ****** ********* work ******* ** ******* and **** ******.

Genetec ******** '********* ******' **** *****

**** ****** ********* **** Genetec **** ***** ******** customized ****** ***** ** automate ********* *********. *** example, **** *** '******** *********/********* ******', ***** ***:

******** * ******** ********* report ** *********** *** might **** **** ** contact ** ** ***** proximity **** * ******** individual ****** * ******* time *****.

******* ***** ****** **** report ** ******** *** configuring * **** ***** in ******** ******.

******* ********* ** ** that *** ****** *** not ******** *** ********* Coronavirus ************ ******* ** monitors **** *** ******** of * ******** **** are ******-**********:

*** ****** ** ***** for ********, ********* *****, elevators, **********, ***.

*******, ******* ********** *** operational ***** ** **** that ****:

**** ****** *** ****** does *** ****** ***** spaces, *** **** **** we *** ******** *********** entering ***** ***** ****** through ******* ******** **** permit ** ** ****** down *** ********* ****** who *** **** *** contact **** ******* **** was ************, *** ****** them ** ******.

**** ******** ****** *** known ** **** ****** positive, * ****** ** names ** ***** *********** with *** **** ********/*******/********* within * ******* **** period ** *********:

IPVM Image

Detrios *****-** ******** ****** ****

******* ******* ***************** * ******* **** of ******** ****** *** no **** *********** ********** to * ****** ** access ******* ********* ****, Avigilon ***, ********* ********, LenelS2, ***, *** ******** House.

*** **** ********* ** activity ****** ***** *** same **** ** ********* potential ********* ***** ** others ** * ********:

**** ****** *** ** specified ****** *** ***** a *****-** ******** ********** entered ** ****. ************** can **** ******* * CSV ****** ** ***** potentially ******* ** *****-**, with *** ******* ** obfuscate *****-** ******** ** exposed ***********’ *****, ** protect ******’* ********** *** calculate *** ********* ** exposure.

*** **** **** **** **** ***** Convergint's************ ******** *****.

*******

** *** *** ** integrator ******* *** ********, contact ***-***** *** ***** them ** ******** *** to *** ****, ********** up ****** ******, *** setting ** ******* ********** to **** ********* ********* risks.

* ****** ** ****'* systems *** ****** **** will ****** ******* *** opportunities ** ******* **** for ***** *** ******.

******* ***** ****** ** keeping '*********' ***** ****, it *** **** ****** the **** ** *********** exposure ***** *******. ** also * ***** ****** to ******* ***-***** *** can ******** ******** ** a *********** ****.

Comments (0)

Read this IPVM report for free.

This article is part of IPVM's 6,598 reports, 889 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.

Already a member? Login here | Join now

Related Reports

Access Control Levels and Schedules Tutorial on Sep 29, 2020
Configuring access levels and setting up schedules is central to maintaining...
Verkada Access Control Tested on Sep 09, 2020
Verkada raised $80 million earlier in 2020, expanding from video into access...
Ubiquiti Access Control Tested on Oct 21, 2020
Ubiquiti has become one of the most widely used wireless and switch providers...
Exit Devices For Access Control Tutorial on Aug 25, 2020
Exit Devices, also called 'Panic Bars' or 'Crash Bars' are required by safety...
Drain Wire For Access Control Reader Tutorial on Sep 23, 2020
An easy-to-miss cabling specification plays a key role in access control, yet...
Remote Network Access for Video Surveillance Guide on Jul 27, 2020
Remotely accessing surveillance systems is key in 2020, with more and more...
AHJ / Authority Having Jurisdiction Tutorial on Aug 06, 2020
One of the most powerful yet often underappreciated characters in all...
Monitoring Alarm Systems From Home - Innovation or Danger? on Oct 13, 2020
Remote monitoring by alarm companies since COVID-19 is bringing cost savings...
Avigilon Social Distancing Analytics Tested on Aug 26, 2020
Avigilon released its social distancing analytics in response to the...
Access Control and Video Integration Statistics 2020 on Oct 08, 2020
Video Surveillance and Access Control are two of the most common security...
Actual Coronavirus Testing Options Examined on Aug 13, 2020
Fever cameras have emerged as an indirect and flawed way to test for...
US GSA Explains NDAA 889 Part B Blacklisting on Jul 31, 2020
With the 'Blacklist Clause' going into effect August 13 that bans the US...
Dedicated Vs Converged Access Control Networks Statistics 2020 on Sep 10, 2020
Access control is a crucial system where the network used can impact life...
Free Online NFPA, IBC, and ADA Codes and Standards 2020 on Sep 03, 2020
Finding applicable codes for security work can be a costly task, with printed...
Forced Door Alarms For Access Control Tutorial on Aug 17, 2020
One of the most important access control alarms is also often ignored....

Recent Reports

Consultants Online Show LIVE Today! on Oct 27, 2020
IPVM's 7th online show will feature 20+ consultants and recruiters presenting...
Eagle Eye Networks Raises $40 Million on Oct 27, 2020
Eagle Eye has raised $40 million aiming to "reinvent video...
Hikvision Q3 2020 Global Revenue Rises, US Revenue Falls on Oct 27, 2020
While Hikvision's global revenue rises driven by domestic recovery, its US...
VICE Investigates Verkada's Harassing "RawVerkadawgz" on Oct 26, 2020
This month, IPVM investigated Verkada's sexism, discrimination, and cultural...
Six Flags' FDA Violating Outdoor Dahua Fever Cameras on Oct 26, 2020
As Six Flags scrambled to reopen parks amid plummeting revenues caused by the...
ISC Brasil Digital Experience 2020 Report on Oct 23, 2020
ISC Brasil 2020 rebranded itself to ISC Digital Experience and, like its...
Top Video Surveillance Service Call Problems 2020 on Oct 23, 2020
3 primary and 4 secondary issues stood out as causing the most problems when...
GDPR Impact On Temperature / Fever Screening Explained on Oct 22, 2020
What impact does GDPR have on temperature screening? Do you risk a GDPR fine...
Security And Safety Things (S&ST) Tested on Oct 22, 2020
S&ST, a Bosch spinout, is spending tens of millions of dollars aiming to...
Nokia Fever Screening Claims To "Advance Fight Against COVID-19" on Oct 22, 2020
First IBM, then briefly Clorox, and now Nokia becomes the latest Fortune 500...
Deceptive Meridian Temperature Tablets Endanger Public Safety on Oct 21, 2020
IPVM's testing of and investigation into Meridian Kiosk's temperature...
Honeywell 30 Series and Vivotek NVRs Tested on Oct 21, 2020
The NDAA ban has driven many users to look for low-cost NVRs not made by...
Ubiquiti Access Control Tested on Oct 21, 2020
Ubiquiti has become one of the most widely used wireless and switch providers...
Avigilon Aggressive Trade-In Program Takes Aim At Competitors on Oct 20, 2020
Avigilon has launched one of the most aggressive trade-in programs the video...
Mexico Video Surveillance Market Overview 2020 on Oct 20, 2020
Despite being neighbors, there are key differences between the U.S. and...