Forced Door Alarms For Access Control Tutorial

By: Brian Rhodes, Published on Apr 04, 2018

One of the most important access control alarms is also often ignored.

"Forced Door" provides a vital and even critical notification against security risks, but many users simply dismiss them as too minor for a response.

Why is this the case? How can the situation be corrected? We examine these key factors inside:

  • Why Forced Door Alarms Are Ignored As Nuisance
  • Ignoring Them Is A Bad Policy
  • False Alarm Root Causes
  • Common Preventions For False Forced Door Alarms
  • Forced Door Alarms Are Option, But Valuable For Security

Forced Door Is Common Nuisance Alarm

Despite the dramatic name, a 'forced door alarm' almost never means an external threat has pried open a door.

Instead, when a guard or security operator is dispatched to check out the alarm, often what is discovered is an otherwise locked and perfectly functioning door.

Coupled with its rather frequent occurrence, many quickly learn to dismiss the notification as 'noise' and choose to focus on more urgent and likely threats.

Simply Ignoring Is Bad Solution

However, ignoring these outright presents a huge problem. While the risk may be low, being promptly notified when someone forces open a door is a core value of EAC. Letting a system malfunction persist and dismissing it as a 'nuisance' is shortsighted and can result in disaster.

Get Notified of Video Surveillance Breaking News
Get Notified of Video Surveillance Breaking News

The Root Causes Of False Forced Door Alarms

Despite the same alarm message appearing on different doors, the actual root cause can differ. Inspecting the door, lock hardware, and access devices for tampering is the first step; if nothing appears out of the ordinary, then observing user behavior through the door is next.

The most common sources are:

Hardware Maladjustment or Tampering

Due to simple mechanical wear or malicious tampering of latches and sensors, an EAC system may mistakenly send 'forced door' alarms. The first aspect to troubleshoot is checking that all locks (electric strikes/ drop bolts / maglocks) are free of tampering and are in proper alignment. Especially around doors commonly used for break areas (eg: smoke break lean-tos, cafeteria access) hardware tampering is a prime culprit. Taped down latch bolts, trash inserted into strike boxes, and copy paper stuck between armature and magnet can result in doors being closed but not secured.

RTE PIRs

Aside from tampering or wear, the RTE devices, specifically PIR sensors, are the biggest cause of forced door alarming. The timing of the sensor is often different than the delay periods programmed into the access system, and if the operation of the two elements is out of sync, alarms can result.

Mechanical Keys

When no mechanical issue is found, the root cause is often 'outside' the system via unauthorized use of mechanical keys to open doors. Users sometimes 'rebel' to gain entry and continue the habits of unlocking doors without using electronic credentials.

Other more specific causes may be present, such as malfunctioning or improperly configured sensors with the door controller or discrepancies in programming logic of the EAC system.

Common Solutions

Fortunately, correcting these issues is typically simple and inexpensive:

  • Hardware Misadjustment or Tampering: Locking hardware, particularly commercial grades, are durable and dependable devices. While periodic tightening of screws or position adjustments may be required, once done the lock is typically good for many more reliable cycles. In the case of tampering, simply cleaning up trash, tightening down sensors, or removing tape and other foreign objects from the opening is sufficient to get doors in order.
  • RTE PIRs: Adjusting PIR / EAC system interaction is more complex than adjusting hardware. In many cases, the time a sensor is active/contacts latched must agree with the timing in the panel, and some trial and error may be required to completely eliminate the problem. This may include replacing the PIR to be based on timed behavior or adjustable settings.
  • Mechanical Keys: Accounting for all issued mechanical keys is the crux of solving this issue. Many keying systems fall out of management well before an EAC system is installed, so revoking and restricting their use is a critical step. Breaking old habits are difficult, but training users on the proper use of credentials in lieu of keys is a necessary step. Controlling access to mechanical keys with an EAC system via electronic lockbox is one method of dealing with this.

Not Required, But Useful

Many end-users choose to disable or do not use 'forced door' notifications altogether. Facilities that do not actively monitor system status, or only passively respond to events often just leave those features unconfigured. Since EAC system status alarms are only useful if actively dispatched against, the feature would be ignored regardless of accuracy.

However, for facilities interested in using EAC as a cross-functional intrusion alarm system, using properly configured 'Forced Door' alarms could potentially save hundreds of dollars in purchasing redundant intrusion alarm system components. Many EAC systems and Intrusion alarm systems can be integrated together, and if configured correctly, the alarms from the EAC system can greatly enhance the monitored visibility of an intrusion system.

[Note: This guide was originally written in 2013, but substantially updated in 2018.]

Comments (4) : PRO Members only. Login. or Join.

Related Reports

HID Mobile Tested on Jun 21, 2019
HID Global is one of the largest access brands, but their mobile access has had challenges. Indeed, the company has already restructured their...
Repositionable Multi-Imager Camera Shootout - Avigilon, Axis, Dahua, Hanwha, Hikvision, Panasonic, Vivotek on Jun 19, 2019
Repositionable multi-imager cameras are one of the fastest growing segments in video surveillance, with a slew of new offerings being recently...
Genetec Synergis Cloud Link - Complex, Costly and Confusing on Jun 18, 2019
Genetec's Synergis Cloud Link is complex, costly and confusing compared to competitor access control architectures. Inside this note, we examine...
Biometrics Usage Statistics 2019 on Jun 17, 2019
While face and fingerprint recognition are used regularly for smartphones, it is not as common in physical security. In this note, we examine...
ADT Eliminating Acquired Brands, Unifying Under 'Commercial' Brand on Jun 14, 2019
ADT is eliminating the brands of the many integrators it has acquired over the past few years, including Red Hawk, Aronson Security Group (ASG),...
Farpointe Data Conekt Mobile Access Reader Tested on Jun 13, 2019
California based Farpointe Data has been a significant OEM supplier of conventional access readers for years to companies including DMP, RS2, DSX,...
Dumber Techs, Bad Box Movers, Says Australian Distributor on Jun 10, 2019
Techs today are "dumber" than they used to be, despite better education and training and that makes a typical day "frustrating" for one...
Hikvision DeepinMind 2019 Test on Jun 06, 2019
In 2018, Hikvision's DeepinMind AI NVR performed terribly, recognizing vehicles, animals, and other objects as humans, misclassifying demographics,...
OSDP Access Control Guide on Jun 04, 2019
Access control readers and controllers need to communicate. While Wiegand has been the de facto standard for decades, OSDP aims to solve major...
Vidsys New President Interviewed on May 31, 2019
A decade ago, PSIM was hot with projections then of a billion dollar market by now. This has not come close to happening. However, Vidsys, one of...

Most Recent Industry Reports

HID Mobile Tested on Jun 21, 2019
HID Global is one of the largest access brands, but their mobile access has had challenges. Indeed, the company has already restructured their...
Genetec Beats Milestone For IHS #1 on Jun 21, 2019
For years, Milestone has touted that they are the #1 VMS. Now, Genetec has beaten them in IHS rankings. But what is this? Even other manufacturers...
Risk of Amazon Alexa Guard: No Battery Or Cell Backup on Jun 20, 2019
Amazon positions its Alexa Guard Service as a "smart home security system" and says it can help you "keep your home safe". However, the...
Exacq Remote Cloud Access Tested on Jun 20, 2019
Remote cloud access has been missing from most VMSes (including Exacq and Milestone). Now, Exacq, after releasing Cloud Drive Storage earlier in...
Briefcam Buys Frost Award* on Jun 20, 2019
Frost 'awards' are well-known and widely disrespected. Now Briefcam is touting their win. The way it has worked for many years is that Frost...
IFSEC 2019 Show Report on Jun 19, 2019
The UK's largest trade show, IFSEC, is underway and IPVM has been examining what is new and happening at the show. Inside, we cover: Huawei...
Repositionable Multi-Imager Camera Shootout - Avigilon, Axis, Dahua, Hanwha, Hikvision, Panasonic, Vivotek on Jun 19, 2019
Repositionable multi-imager cameras are one of the fastest growing segments in video surveillance, with a slew of new offerings being recently...
Genetec Synergis Cloud Link - Complex, Costly and Confusing on Jun 18, 2019
Genetec's Synergis Cloud Link is complex, costly and confusing compared to competitor access control architectures. Inside this note, we examine...
Startup Vaion Launching End-to-End AI Solution Backed with $20 Million Funding on Jun 17, 2019
An EU / USA video surveillance startup, Vaion, founded by ex-Cisco Senior Directors is launching an end-to-end VSaaS platform with $20 million in...
Biometrics Usage Statistics 2019 on Jun 17, 2019
While face and fingerprint recognition are used regularly for smartphones, it is not as common in physical security. In this note, we examine...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact