Users Manual
VII
6.2.8 Viewing Access Control Records...................................................................................... 71
6.2.9 Viewing Device Logs ........................................................................................................ 73
Cybersecurity Recommendations ................................................................................... 75 Appendix 1