The Inner Range Enterprise Solution, powered by Integriti, supports a verbose access and activity logging engine, known as "Review".
Review shows the real-time events and transactions from every aspect of the system, as well as integrated third-party subsystems, with all events date/time stamped. All events are stored within the database and the review tables have been optimized to rapidly return the results of filtered queries to generate reports. All events are categorized with specific details provided for each event.
Review categories include:
Access Granted
Access Denied
Access In
Access Out
Access Anti-pass-back
Door Events
Inactive Credential Use
Hardware Events
Integration Events
Intruder Alarms
Software Administration Events (e.g. operator login, operator actions performed etc)
System Health (e.g. battery fail, AC fail, module lost etc)
many more.
The historic review of all events and transactions from every aspect of the system, including audit trails, are stored and retained indefinitely. These events can be pushed in real-time to a third-party ingestion service (e.g. Power BI) using industry-standard protocols for further analysis.
Every event is categorized into 1 of 6 categories, and 1 of 717 sub-categories, making it easy to navigate to the specific event types of interest. Additionally, review events can be filtered by time-period, or through the “search” function to locate specific review events.
Audit
Any changes made within the application by an operator are audited through our forensic audit history. The history details all programming changes, the name of the operator that made the changes, the time/date of changes, and a snapshot of all changes (version history). This audit also includes the ability to roll-back any of the changes previously made.
For more information on how Inner Range’s Enterprise solution can empower your security solutions contact an Inner Range representative.