Table of Contents
Ensuring the security of your property is crucial, and accessing the logs and history of your Yale Assure Lock 2 can provide valuable insights into who has entered or attempted to enter your premises. This guide walks you through the steps to access these logs effectively.
Understanding Yale Assure Lock 2 Logs & History
The Yale Assure Lock 2 features a comprehensive logging system that records access events. These logs include details such as the date, time, method of entry, and user information. Accessing this data helps you monitor security and identify any unauthorized attempts.
Prerequisites for Accessing Logs
- An active Yale Access account linked to your lock.
- Stable internet connection.
- The Yale Access app installed on your smartphone.
- Proper authorization, if managing multiple users.
Steps to Access Logs & History
Follow these simple steps to view the access logs of your Yale Assure Lock 2:
Step 1: Open the Yale Access App
Launch the Yale Access app on your smartphone. Ensure you are logged into your account associated with the lock.
Step 2: Select Your Lock
From the main dashboard, tap on the specific Yale Assure Lock 2 device you want to review.
Step 3: Access the Log or History Section
Navigate to the ‘History’ or ‘Logs’ tab within the device settings. This section displays recent access events.
Step 4: Review Access Events
Examine the list of recent entries, noting details such as:
- Date and time of access
- Method of entry (e.g., keypad, app, biometric)
- User name or ID (if applicable)
- Attempt status (successful or failed)
Additional Tips for Managing Logs
To maximize security, consider the following tips:
- Regularly review logs for unusual activity.
- Enable notifications for access attempts.
- Keep your app and firmware updated for optimal security.
- Manage user permissions carefully to restrict access.
Conclusion
Accessing the logs and history of your Yale Assure Lock 2 is a straightforward process that significantly enhances your property’s security. By routinely monitoring these records, you can quickly identify and respond to any suspicious activity, ensuring peace of mind.