KEYWATCHER III ILLUMINTED FAQ
Frequently Asked Questions
A. This will be a programming issue – check that the user has got the correct key and/or group restrictions applied to them correctly in their profile. It could also be because of a time restriction applied to the key or group.
A. When a dirty tag has been returned into the cabinet the sensors did not recognise it being returned from the last user. A Level 1 User will need to access the Utilities Menu directly at the box and perform a Release Location. Please refer to the Release Location and Service & Maintenance notes provided for more information.
A. Sometimes tags can get lost or damaged. You will need to get a blank tag that has NOT been pre-programmed into the database. A level 1 user will need to access the Utilities Menu directly at the box and perform a Replace Key function. Please refer to Replace Key notes provided for more information.
A. If there is no information in the report this is because the transactions have not been collected. Open the Keypro 3 software and select the Transactions Icon from Main Page – and do a Collect Transactions. Note: The system is only capable of storing 4000 transactions in it’s memory so if there are more than 4000 to collect, the system will only collect the most recent 4000 transactions it has stored.
A. Generally a power spike is responsible for this & can sometimes seize the electric strike from opening. A level 1 user will need to access the Setup Menu directly at the box and perform a System Restart. This will reboot the KeyWatcher maintaining all of its users and transactions memory and will reinstate the electric strike.
A. The KeyWatcher comes standard with a battery backup, which allows the KeyWatcher to operate without AC power for approximately 48-hours. The system also has a lithium battery backup that allows the KeyWatcher to hold its programming during a long term AC power loss. The KeyWatcher will function normally during power outages.
A. This alarm will occur due to AC power being lost. The system will continue to work on back up batteries. Level 1 or 2 Users can bypass this alarm by cursoring over to No when asked if they wish to cancel the alarm. By selecting No will take you to the Remove key prompt. If you select Yes you will get a message saying that this alarm cannot be cancelled until AC power is restored.
A. The KeyWatcher is one of the few systems that provides a method to manually override the system to release key sets if the system is not responding.
If you have your emergency override key (Medeco) open the main front door, then with the same key open the key panel door. Locate grey ribbon cable from the back of the panel that leads to the circuit board and remove gently. Lift down the spring bolt located in top left hand corner and tilt key panel slightly to the side allowing you to completely remove the panel from the cabinet. Behind each slot location is a square hole. Find an object long enough to fit through the hole and push down spring and remove the tag.
Support is only a phone call way, and we can usually talk you through most issues within a few minutes.
Maximize your key control system with user-friendly KeyPro key locker management software. A PC application with remote access capabilities, KeyPro lets system managers establish permission levels for each User Code and monitor data from any desktop connected to the network.
The key locker software can run activity reports, sort based on different criteria, view and print reports, and more. System managers can generate practical management reports, which trace key movements by time, date and user code. An audit trail report indicates the time and date of every key accessed by a user for a given time parameter.
A built-in scheduler automatically downloads all data to a secure PC, allowing system managers to sort and analyze information to maintain maximum control of access and security issues. SmartKey now offers the capability to send priority email alerts to security managers, keeping them informed of the whereabouts of SmartKeys.
KEYPRO III KEY CONTROL SOFTWARE FEATURES
- User-Friendly Interface – Easy to use graphical interface makes programming and running reports quick and simple to do.
- Real-time Transaction Polling – A built-in scheduler automatically downloads all SmartKey data to centralized or remote computers.
- Maximized Network Capabilities – With KeyPro III’s networking capabilities, sensitive database files can be kept on a network server. This also allows for any installation of KeyPro III to have the ability to make changes and synchronize the data with the SmartKey system.
- Extensive Key Management Reporting – Reports can be generated based on specific key, user or alarm transaction. KeyPro provides comprehensive reporting methods, including the ability to sort by last name, first name, ascending and descending sequential order.
- Local Area Network Access – Accessibility to the key management systems over a LAN enables managers to perform functions on any SmartKey System via TCP/IP.
Generate Reports by:
- List Of Keys
- Keys currently in use
- Keys Removed
- Transactions within specific date ranges
- Much more …
Priority Email Alerts
The key management systems now offer the capability to send priority email alerts to security managers, keeping them informed of the whereabouts of SmartKeys.
Another key feature of the software is the built-in scheduler. This tool automatically downloads all data to a secure PC, allowing system managers to sort and analyze the information so they maintain maximum control of access and security issues.
When combined with the Key Pro III software, no other similar product on the market is as technically advanced as the SmartKey Locker System and KeyWatcher by Morse Watchmans.
With Key Reservations, authorized users can even reserve a key in the system for a specified time frame. It’s a convenient, easy way to guarantee access when a key is needed.