Forced Door Alarms For Access Control Tutorial

By: Brian Rhodes, Published on Apr 04, 2018

One of the most important access control alarms is also often ignored.

"Forced Door" provides a vital and even critical notification against security risks, but many users simply dismiss them as too minor for a response.

Why is this the case? How can the situation be corrected? We examine these key factors inside:

  • Why Forced Door Alarms Are Ignored As Nuisance
  • Ignoring Them Is A Bad Policy
  • False Alarm Root Causes
  • Common Preventions For False Forced Door Alarms
  • Forced Door Alarms Are Option, But Valuable For Security

Forced Door Is Common Nuisance Alarm

Despite the dramatic name, a 'forced door alarm' almost never means an external threat has pried open a door.

Instead, when a guard or security operator is dispatched to check out the alarm, often what is discovered is an otherwise locked and perfectly functioning door.

Coupled with its rather frequent occurrence, many quickly learn to dismiss the notification as 'noise' and choose to focus on more urgent and likely threats.

Simply Ignoring Is Bad Solution

However, ignoring these outright presents a huge problem. While the risk may be low, being promptly notified when someone forces open a door is a core value of EAC. Letting a system malfunction persist and dismissing it as a 'nuisance' is shortsighted and can result in disaster.

Get Notified of Video Surveillance Breaking News
Get Notified of Video Surveillance Breaking News

The Root Causes Of False Forced Door Alarms

Despite the same alarm message appearing on different doors, the actual root cause can differ. Inspecting the door, lock hardware, and access devices for tampering is the first step; if nothing appears out of the ordinary, then observing user behavior through the door is next.

The most common sources are:

Hardware Maladjustment or Tampering

Due to simple mechanical wear or malicious tampering of latches and sensors, an EAC system may mistakenly send 'forced door' alarms. The first aspect to troubleshoot is checking that all locks (electric strikes/ drop bolts / maglocks) are free of tampering and are in proper alignment. Especially around doors commonly used for break areas (eg: smoke break lean-tos, cafeteria access) hardware tampering is a prime culprit. Taped down latch bolts, trash inserted into strike boxes, and copy paper stuck between armature and magnet can result in doors being closed but not secured.


Aside from tampering or wear, the RTE devices, specifically PIR sensors, are the biggest cause of forced door alarming. The timing of the sensor is often different than the delay periods programmed into the access system, and if the operation of the two elements is out of sync, alarms can result.

Mechanical Keys

When no mechanical issue is found, the root cause is often 'outside' the system via unauthorized use of mechanical keys to open doors. Users sometimes 'rebel' to gain entry and continue the habits of unlocking doors without using electronic credentials.

Other more specific causes may be present, such as malfunctioning or improperly configured sensors with the door controller or discrepancies in programming logic of the EAC system.

Common Solutions

Fortunately, correcting these issues is typically simple and inexpensive:

  • Hardware Misadjustment or Tampering: Locking hardware, particularly commercial grades, are durable and dependable devices. While periodic tightening of screws or position adjustments may be required, once done the lock is typically good for many more reliable cycles. In the case of tampering, simply cleaning up trash, tightening down sensors, or removing tape and other foreign objects from the opening is sufficient to get doors in order.
  • RTE PIRs: Adjusting PIR / EAC system interaction is more complex than adjusting hardware. In many cases, the time a sensor is active/contacts latched must agree with the timing in the panel, and some trial and error may be required to completely eliminate the problem. This may include replacing the PIR to be based on timed behavior or adjustable settings.
  • Mechanical Keys: Accounting for all issued mechanical keys is the crux of solving this issue. Many keying systems fall out of management well before an EAC system is installed, so revoking and restricting their use is a critical step. Breaking old habits are difficult, but training users on the proper use of credentials in lieu of keys is a necessary step.  Controlling access to mechanical keys with an EAC system via electronic lockbox is one method of dealing with this.

Not Required, But Useful

Many end-users choose to disable or do not use 'forced door' notifications altogether. Facilities that do not actively monitor system status, or only passively respond to events often just leave those features unconfigured. Since EAC system status alarms are only useful if actively dispatched against, the feature would be ignored regardless of accuracy.

However, for facilities interested in using EAC as a cross-functional intrusion alarm system, using properly configured 'Forced Door' alarms could potentially save hundreds of dollars in purchasing redundant intrusion alarm system components. Many EAC systems and Intrusion alarm systems can be integrated together, and if configured correctly, the alarms from the EAC system can greatly enhance the monitored visibility of an intrusion system.

[Note: This guide was originally written in 2013, but substantially updated in 2018.]

Comments (4) : PRO Members only. Login. or Join.

Related Reports

Camera Field of View (FoV) Guide on Nov 13, 2019
Field of View (FoV) and Angle of View (AoV), are deceptively complex. At their most basic, they simply describe what the camera can "see" and seem...
The Access Control Codes Guide: IBC, NFPA 72, 80 & 101 on Nov 07, 2019
For access, there is one basic maxim: Life safety above all else. But how do you know if all applicable codes are being followed? While the...
90+ Companies Profile Directory on Nov 05, 2019
While IPVM covers the largest companies in the industry regularly (like Axis, Dahua, Hikvision, etc.), IPVM strives to do a profile post on each...
Tailgating: Access Control Tutorial on Oct 31, 2019
Nearly all access control systems are vulnerable to an easy exploit called 'tailgating'. Indeed, a friendly gesture in holding doors for others...
France Declares School Facial Recognition Illegal Due to GDPR on Oct 31, 2019
France is the latest European country to effectively prohibit facial recognition as a school access control solution, even with the consent of...
Lock Status Monitoring Tutorial on Oct 28, 2019
Just because access doors are closed does not mean they are locked. Unless access systems are using lock status monitoring, the doors and areas...
Security Canada Central Show Report 2019 on Oct 24, 2019
IPVM attended Security Canada Central in Toronto to see what is new in the Canadian market. Inside, we share videos and dozens of images...
Covert Elevator Face Recognition on Oct 24, 2019
Covert elevator facial recognition has the potential to solve the cost and complexity of elevator surveillance while engendering immense privacy...
Access Control Door Controllers Guide on Oct 22, 2019
Door controllers are at the center of physical access control systems connecting software, readers, and locks. Despite being buried inside...
Securing Access Control Installations Tutorial on Oct 17, 2019
The physical security of access control components is critical to ensuring that a facility is truly secure. Otherwise, the entire system can be...

Most Recent Industry Reports

Camera Field of View (FoV) Guide on Nov 13, 2019
Field of View (FoV) and Angle of View (AoV), are deceptively complex. At their most basic, they simply describe what the camera can "see" and seem...
UK Big Brother Watch: Hikvision Is 'Morally Bankrupt' on Nov 13, 2019
UK civil liberties advocate Big Brother Watch has condemned Hikvision as being 'morally bankrupt' following IPVM exposing Hikvision marketing...
Color Low Light Mega Camera Shootout - Avigilon, Axis, Bosch, Dahua, Hanwha, Hikvision, Panasonic, Speco, Sony, Vivotek on Nov 12, 2019
This is the biggest color low light shootout ever, testing 20+ super low light models from 10 manufacturers: Increasingly, each manufacturer...
Wireless / WiFi Access Lock Guide on Nov 12, 2019
For some access openings, running wires can add thousands in cost, and wireless alternatives that avoid it becomes appealing. But using wireless...
Open vs End-to-End Systems: Integrator Statistics 2019 on Nov 11, 2019
Preference for open systems is on the decline, according to new IPVM statistics. We asked integrators: For video surveillance systems, do you...
Biggest Low Light Problems 2019 on Nov 08, 2019
Over 150 integrators responded to our survey question: "What are the biggest problems you face getting good low-light images?" Inside, we share...
US Issues Criminal Charges For Fraudulently Selling Hikvision And Other China Products on Nov 07, 2019
The US government has made an unprecedented move on the video surveillance supply chain, charging a US company, Aventura for "having conspired with...
The Access Control Codes Guide: IBC, NFPA 72, 80 & 101 on Nov 07, 2019
For access, there is one basic maxim: Life safety above all else. But how do you know if all applicable codes are being followed? While the...
Rhombus Cameras, VMS and Analytics Tested on Nov 06, 2019
Rhombus boasts they have created "the new standard in Enterprise, cloud-managed video security" and told IPVM in January 2019 they offer twice the...