User's Manual
Table Of Contents
- 1. Introduction
- 2. HLX-24 Quick Reference
- 3. Specifications
- 4. Installation
- 5. Programming the HLX-24
- 6. Installer Menu
- 6.1 Change Code
- 6.2 Zones
- 6.3 Enrolling
- 6.4 Security
- 6.4.1 Exit Delay
- 6.4.2 Exit Restart
- 6.4.3 Entry Delay
- 6.4.4 Auto Arming
- 6.4.5 Siren Time
- 6.4.6 Siren Mode
- 6.4.7 Local Siren
- 6.4.8 External Siren
- 6.4.9 Supervision Time
- 6.4.10 Jamming
- 6.4.11 No Activity Time
- 6.4.12 Trouble Beeps
- 6.4.13 Bypass Option
- 6.4.14 Quick Arm
- 6.4.15 Arm Instant
- 6.4.16 Panic Button
- 6.4.17 Duress Code
- 6.4.18 Alarm Cancel
- 6.4.19 Alarm Abort Time
- 6.4.20 Backlight Time
- 6.4.21 Hide Display
- 6.4.22 Key Beeps
- 6.4.23 Select Language
- 6.4.24 EN-CENELEC
- 6.4.25 CP-01
- 6.5 Communications
- 6.6 Automation
- 6.7 Messages
- 6.8 Maintenance
- 7. User Menu Structure
- 8. Reading the Event Log
- A. Quick Reference to Installer Menu
- B. Quick Reference to User Menu
- C. Sensor Placement and Helpful Reference Tables
- D. Reporting Codes
- E. GSM Stick Errors
- F. Settings Requirements for CENELEC
- G. Default Parameter Values
- H. Labeling Instructions
- I. Declaration of Conformity
- J. Limited Warranty
Reading the Event Log
HLX-24 Hardware Installation and Programming Manual 53
8. Reading the Event Log
The HLX-24 event log stores up to 250 events. When the log is full, the new
incoming event replaces the oldest event.
Events are displayed in a chronological order, and include the date and time of
their occurrence.
To access the Event Log:
1. Access the event log by pressing 8 on the keypad when the system is in
normal mode.
2. To read an event, enter the Master code and press Enter.
3. Browse the even log using Menu or go directly to an event by entering
the event number using the numeric keypad.
4. Press Enter to view the date and time of the occurrence.
In EN-CENELEC standard menu, the event filter may be changed (default=10) so
if an event reoccurs, the system only shows the event the defined number of
times in the event log.
The event registration into log reoccurs after system disarming by the user.