To ensure that a visitor’s activities can be monitored throughout their visit, you
must check in visitors, using the Visitor management task. You can
either pre-register visitors for later check-in, or create a visitor and check them in
immediately.
Video:
Watch this video to learn more. Click the
Captions icon (CC) to turn on video
captions in one of the available languages. If using Internet Explorer, the video might
not display. To fix this, open the Compatibility View Settings
and clear Display intranet sites in Compatibility View.
Text:
Before you begin
Access rules cannot be directly associated to visitors. Therefore, to grant access rights to a visitor, you must create a
cardholder group that is reserved for visitors in Config
Tool, and assign access rules to the
group. For more information about creating cardholder groups,
see the Security
Center Administrator
Guide.
To check in a new visitor:
From the home page, open the Visitor management
task.
Click New ().
At the top of the dialog box, enter the visitor’s first name and last
name.
To assign a picture to the visitor, click the silhouette and select one of the
following options:
Load from file:
Select a picture from disk. All standard image formats are supported.
Load from webcam:
Take a snapshot with your webcam. This option appears only if you have a webcam attached to your workstation.
Load from camera:
Take a snapshot from a camera managed by Security
Center. When you click Load from camera, a separate capture dialog box
opens. Select the video source, and click Take snapshot ().
Load from clipboard:
Load the picture copied to the clipboard. This option appears only if you used the Windows copy command to save a picture onto your clipboard.
To edit the picture, click it to open the Image editor and use the
editing options at the top of the editor’s dialog box.
In the Status
section, set the following:
NOTE: The Activation date is the same as the check-in date.
You can set the activation date to a date in the future, which allows you to
create visitor profiles in advance.
Status:
For a visitor's credentials to work, their status must
be Active. You can set their status to Active immediately by
clicking Save and check in ().
Activation:
Set an activation for their profile:
Never:
The default value. Use this option when you plan to check in a visitor
manually or you don't know when the visitor will be arriving.
Specific date:
Expires on a specific date and time.
Expiration:
Set an expiration for their profile:
Never:
Never expires.
Specific date:
Expires on a specific date and time.
Set expiration on first use:
Expires a specified number of days after the first use.
When not used:
Expires when it has not been used for a specified number of days.
Assign a credential to the
visitor so that their movement can be tracked in the system.
NOTE: You can assign a credential now or later.
Assign the visitor to a cardholder group.
Cardholder groups define which access rules apply to the visitor.
To assign the first cardholder group, click the Cardholder
group list and select a cardholder group.
NOTE: Only cardholder groups configured for visitors are listed. A
visitor can belong to more than one cardholder group.
To assign additional cardholder groups, click
Advanced (), then click
Add an item ( ). In the dialog box that opens, select
the cardholder groups, and click OK.
Enter the visitor’s email address.
(Optional) Assign one or two hosts (or escorts) to the visitor, as
follows:
For more information about the visitor escort rule, see
the Security Center Administrator Guide.
Click the Visitor host list and select a
cardholder as the visitor’s host.
(optional) To assign a second host, click
Advanced (), then click
Add an item ( ). In the dialog box that opens, select a
cardholder to assign as host and click OK.
Select the option Escort required if the visitor
is not allowed to access certain areas unless their assigned hosts also
presents their credentials after them within a certain delay.
NOTE: The order in which the hosts present their credentials is not
important.
(Optional) Enter a date and time into the Expected
arrival field.
(Optional) If custom fields are defined for visitors, enter the additional
visitor information.
(Optional) In the Advanced section, configure the following visitor properties:
NOTE: Some of these properties can be inherited from the parent cardholder
groups. When a specific value is configured for the visitor, click
Revert to inherited value () to inherit the property
from the parent cardholder groups. If multiple parent groups exist, the most
privileged value is inherited.
If the visitor has been assigned a credential, grant access privileges
to the visitor.
Use extended grant time:
Grants them more time to pass through doors where the Extended grant time parameter is configured for a door. Use this option for those with reduced mobility.
Bypass antipassback rules:
Exempts them from all antipassback restrictions.
To learn more about configuring areas
and doors using the extended grant time and antipassback rules, see
the Security
Center
Administrator Guide.
In the Security clearance field, enter the
visitor’s security clearance level. The security clearance level
determines their access to areas when a threat level is set in Security
Center. Level 0 is the
highest clearance level, with the most privileges.
In the Entity name field,
type a new name for the visitor entity, if you do not want to use the
visitor’s first and last name.
By default, the Entity name uses the
First name and Last
name fields.
(Optional) In the Description field, type a
description for the visitor.
Assign the visitor to a partition.
Partitions determine which Security
Center users have access to
this entity. Only users who have been granted access to the partition
can see the visitor.
Do one of the following:
To pre-register a visitor to be checked in later, click
Save.
To check in the visitor immediately, click Save and check
in.
Next topics
Checking in returning visitors
If a visitor returns to your site, you can check in the visitor without having to re-enter their information, because all checked-out visitors are saved in the database.