Security events in the Alcatraz AI system provide real-time insights into critical actions and system behaviors.
Introduction
This article provides an overview of the security events, their triggers, and how to manage them using the Alcatraz Admin Portal.
What Are Security Events?
Security events are logged activities displayed in the Alcatraz Admin Portal. Some examples include the following:
- Enrollment Events - Manual, auto, and web enrollment of users
- Authentication Events - Single (1FA) and Two-Factor (2FA)
- Tailgating Intelligence: Detecting tailgating, crossing, or unauthorized entry
- Badge-Face Mismatch: When the badge or face is unknown or mismatched.
- Profile Deletions: Auto or manual profile deletions
- Tamper Detection: Identifying tampering with Rock devices or badge readers.
- Rock State: Rock online and offline events
These events appear in real time if the network connection is healthy. In cases of network disruptions, the Rock queues events and syncs them once the connection is restored. Note that extended downtime may lead to potential data loss.
Viewing Security Events
Accessing Events:
- Navigate to
Security Events
in the Admin Portal.
Searching & Filtering Security Events
There are three methods for searching and filtering events, which are described here and highlighted in the screenshot below.
- Use the
Search...
box to enter a device name, device ID, or badge number. You can enter both a facility code and badge number by entering them as FC:NUMBER with the colon in between. - Use the date/time pickers to filter events between a 'start' and 'end' date.
- Use the filter icon over the 'Event' column to filter by event types.
Exporting Security Events
Security events can be exported to a CSV or a PDF file. Exports are limited to 5000 events. Use the filtering methods described above to reduce the number of events to export.
- Go to
Security Events
. - Apply filters if necessary to refine the results.
- Click
Export Events Info
and choose the format (CSV or PDF). - Click
Download
to save the file locally.
Event Summary Table
The table below summarizes the most common security events, their triggers, and the corresponding icons shown on the Rock’s display (where appropriate).