Installing Door Hardware

Author: Brian Rhodes, Published on Oct 23, 2013

Most access installers find themselves in this sticky situation at some point: they need to install or reinstall a door lock. The problem? Door lock installation is a whole world unto itself, and seemingly is fraught with hundreds of different problems to address. When it comes to securing doors, the lock must work perfectly, or security and even life-safety could be at risk.

In this note, we walk though the installation of a lock on our test door. While it is specific to our door and our lock, the general installation process is helpful in many situations. We document that process below.

Installation *******

*** ******* **** ******* * ******* ******* **** *** **** Door, *** ***** **** ********** ***** ** *** ************ ** every **** ****. *** ***** ** ****** ***:

  • ****/***** *********
  • **** ****
  • **** ************
  • ******** ****** *** ***** ***********

********** *** ***** ** ***** **** ****** ** ***** ********* with * **** ****** ** *********** ** *** *****. 

Lock ****

*** ***** **** ** ** ********* *** **** *** *** in *** ****. **** ******* ****** ********* ** ******** *****, but *** ******* ********* *** ***** **** ** ****** *****:

  • ****** ***** ********
  • **** ****** **** ********
  • *******

****** ***** ********:******* **** ***** ******* ** *** *****, ********************** ***** ** ** **********. **** ***** ************** ** *** ***** ***** *** ******, ** *** ***** automatically ******** **** *** **** ******. ** *** ***** ********, the **** ****** **** *** ***** ******** *** ** *** latch *********** **** *** ******. **** ***** ******* * ***** that *** ** ******* ** ********* ** *** ****** *********.

** ********** **** *********,*** ******* ****(**** ****) ******** * ******** ***** **** *** ********** **** a ***********. *** ***** ***** ******* *** ********** ** **** step:

**** ****** **** ********:***** *** ********* ** **** ** ********* ********* ********* ** how/where **** *** ****. *** *******, **** ***** ************************ **** **** **** ******, *** ***** *** ****** *** retract *** ***** *** *** *** ****, *** ***** ****** may **** *** ** **** ** *** ******* ***** **** locked. **** ******** *** ********* ** ** ****** ********* ******** configurable ** *** **** ******. *** ***** ***** ** ** example ** *** ******** ********* ** *** ******* ****, ******* there ** ** '******** ***' ** ******** ********* ** ***** lock:

*** ***** ***************** ** *** **** ******* ******* ** *** specific ***** ***** *********, *** ******* ***** ******* *** *** most ************ ***** ********* *** ******************** *** ******* ********.

*******:**** **** ********** ***** ********* *** ******* **** **** ** order ** ****** *** ****. (***** ******* ***** ********* **** ******.) **** ********* ******* ***** ** *** ***** of *** ****, *** ** ** ** ********* ****** ** pull '**' ** * ****** ** **** *** ****. '***** handing' ***** **** **** ********* *** ** ******** ****** ************, usually ******* ******** * *********** ***** ** ******** *** * spring. ** ******* ***** *** ******** ** ******* **** ****, and *** ******* ***** *** ** **** **** * ***********:

Lock ************

**** *** **** *** **** *******, *** *** **** *** been **********, ** ** ***** ** ***** **** *** ****. Most ***** ** ***** *** ********* **** *** ***** *** - ******* **** ********* ** ***** **** ** *** ***** that ********* ******* *** **** *** ***** **** ******** ******* the *******. ***** ***** ********** *** *********, ***********(*** ******** ********* **** ******** *** ***** ** ********* **** the *****. **** *****, **** ******* ******************** ** ********** *****, ******* *********** ** *** ****** ***** **** **** (if ********).

  • ***** *********
  • ******** ************
  • *******
  • ****

***** *** ************ ******* ** *** ******* **** ****** **** other *****, *** ***********'* ************ ***** ** * ********************* **** *******:

Function ****** *** ***** ***********

*** *********** ** *** ******* ** ********** *** **** ***** like ** ** ********: **** ****/****** *** ****, *** ******* fully *******, *** ***** ** ** ********** ******* ** ************ between *** ****, *****, ******, *** ****. *** ***** ******** checks ********* *******:

  • *** **** ******* *** ***** ********
  • ******** ********* ** ***** *** ********** ******* **** ** *****
  • *** ****** *****
  • *** **** *** ** ******* *** ~*/*” ***** **** ************.
  • *** ******************** **** ****** *** **** **** *** **** ** ******.

** **** *****, ** *** **** ** ******** ******** ****** installation, ** **** *** ***** ** ******** ****** ***. ******** realignment ** *** ******** *** ** ******** ***** ***** ***, but *** **** ***** **** ****** ************ *** **** ** properly **********.

Comments (1)

****** ** *** *** , **** ****** ******** **** ***** door :)

**** **** ** ** **** *** *******.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Anti-Hack Access Card Shields Tested on May 26, 2017
Keeping your access control card information secure is becoming a big priority, especially since cheaper copiers can hack details easily. Multiple...
Alarm Supervision Guide on May 24, 2017
Burglar alarms can constantly monitor the health of attached circuits, sensors, and devices to ensure that they remain operational. This is known...
Hackable 125kHz Access Control Migration Guide on May 19, 2017
Despite being one of the most popular credentials, 125 kHz credentials are easily copied and insecure as we showed in our test results, video...
Amazon Techs Installing IP Cameras Tested on May 18, 2017
In 2015, Amazon started offering video surveillance installation. Now, Amazon has made it a lot easier, with automatic add-on options and...
FLIR Is Giving Away $3,000 Demo Kits on May 17, 2017
Everybody likes free stuff, and FLIR is using that concept to attract dealers by giving them $3,000 worth of demo gear for attending a...
Selling and Valuing Security Integrators on May 12, 2017
This ia a tutorial in how to (1) determine your security integrator's value and (2) to sell your security integrator. If you own an integrator,...
Technician Personal Protective Equipment (PPE) Guide on May 12, 2017
Technicians encounter multiple hazards when running wires and installing security devices. Wearing personal protective equipment, or PPE, helps...
Alarm Circuits Guide on May 09, 2017
Alarm circuits are a fundamental element of wired burglar systems. Designing the alarm circuit greatly affects its performance. In particular,...
Smartphone Controlled Kevo Lock Tested on May 04, 2017
Smartlocks are a growing market, with millions sold. Kwikset's Kevo is one of the most common choices, using the Unikey smart phone access control...
Varifocal Vs Fixed Lens Statistics 2017 on May 04, 2017
Varifocal camera lenses provide more flexibility at installation time, but come at a higher cost. Fixed lens cameras reduce hardware costs, but can...

Most Recent Industry Reports

Anti-Hack Access Card Shields Tested on May 26, 2017
Keeping your access control card information secure is becoming a big priority, especially since cheaper copiers can hack details easily. Multiple...
H.265 / HEVC Codec Tutorial 2017 on May 25, 2017
Since 2013, video surveillance professionals have talked about the potential for H.265. Now, in 2017, H.265 is starting to gain mainstream...
Camera Course Summer 2017 on May 25, 2017
Learn video surveillance and get certified. IPVM provides live online classes, recorded videos, personal help, cutting edge education and...
Most Respected Manufacturer Competitors on May 25, 2017
Manufacturers told IPVM what competitor they most respected. In terms of total revenue, Hikvision, Dahua and Axis are certainly tops but would...
CyPhy 'Unlimited' Flight Time Security Drone Examined on May 25, 2017
Drones face several issues as commercial security platforms - legal restrictions (e.g., in the US, the FAA), costs, and limited flight durations...
Milestone Entry Level Mobile Password Vulnerability Disclosed on May 24, 2017
While many manufacturers have only addressed cybersecurity vulnerabilities after public disclosures were made (or threatened), Milestone has...
How Integrators Use IPVM on May 24, 2017
150 integrators explained how they use IPVM and how it helps them stay informed and improve their business.  The 4 main uses integrators cited for...
Alarm Supervision Guide on May 24, 2017
Burglar alarms can constantly monitor the health of attached circuits, sensors, and devices to ensure that they remain operational. This is known...
Arlo Go Cellular Cloud Camera Tested on May 23, 2017
Totally wireless surveillance cameras are growing but almost all typically depend on a hub and local Internet access. However, many outdoor...
Avigilon New COO James Henderson Profile on May 23, 2017
It has been nearly 2 years since the infamous Bryan Schmode 'resigned' as Avigilon COO. Now, Avigilon once again has a COO, promoting James...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact