Overview
The Access Control Statistics page provides comprehensive analytics on access card usage, authorization patterns, and security events. Monitor who's accessing your facility, when they're entering, and identify any security concerns through detailed card activity tracking. Access this page from Statistics → Access Control in the main navigation.
Key Features:
- Card Inventory: Track total, active, and expired access cards
- Hourly Access Patterns: Visualize card usage throughout the day
- Authorization Analysis: Monitor authorized vs denied access attempts
- Security Monitoring: Track and investigate denied access attempts
- Time Filtering: Analyze patterns across 24h, 7d, 1m, 6m, 4y periods
- Real-Time Alerts: Identify suspicious access patterns immediately
Dashboard Metrics
The top section displays key access card metrics that provide instant visibility into your facility's access control system health and card inventory status.
Total Access Cards
Description: Complete count of all access cards registered in the system
Icon: Blue card symbol
Includes: Active, expired, suspended, and deactivated cards
- Represents total card inventory across all users and zones
- Includes both physical RFID cards and virtual access credentials
- Essential for card procurement and inventory management
- Updates when cards are issued, activated, or deactivated
Active Cards
Description: Number of cards currently authorized for access
Icon: Green checkmark symbol
Status: Valid, non-expired cards with active permissions
- Only cards with current authorization and future expiry dates
- Excludes suspended, revoked, or administratively disabled cards
- Represents actual operational access capacity
- Should align closely with current employee/user count
Expired Cards
Description: Cards that have passed their expiration date
Icon: Yellow/orange clock symbol
Access: Automatically denied at all access points
- Includes cards that expired naturally based on set duration
- Does not include manually suspended or revoked cards
- High count may indicate need for card renewal process
- Users with expired cards will be unable to access facility
Hourly Access Patterns
The Hourly Entrances bar chart displays access card usage distribution across 24-hour periods, revealing facility access patterns, peak times, and unusual activity windows.
Chart Features
- X-Axis: 24 hours from 0:00 to 23:00 in hourly increments
- Y-Axis: Number of access card uses (automatically scaled)
- Bars: Blue vertical bars indicating access volume per hour
- Hover Tooltips: Shows device name and exact access count (e.g., "Entrance @ 8:00 - 24")
- Grid Lines: Horizontal reference lines for easier reading
Understanding Access Patterns
Typical access patterns by facility type:
| Facility Type | Expected Peak Hours | Pattern |
|---|---|---|
| Office Building | 7:00-9:00, 17:00-19:00 | Morning arrival, evening departure spikes |
| 24/7 Facility | 7:00, 15:00, 23:00 | Three shift changes throughout day |
| Data Center | 9:00-17:00 | Business hours only, minimal after-hours |
| Residential | Distributed 6:00-22:00 | Even distribution, individual schedules |
| Healthcare | 6:00-8:00, 14:00-16:00 | Morning staff, afternoon shifts |
Security Anomalies
Watch for unusual patterns that may indicate security issues:
- Late Night Spikes: Unusual access at 23:00-5:00 requires investigation
- Weekend Activity: Access during closed days may be unauthorized
- Volume Drops: Sudden decrease could indicate system failure
- Unexpected Peaks: Abnormal spikes outside normal hours need review
Access Card Types Distribution
The donut chart visualizes the breakdown of access attempts by authorization status, providing immediate insight into system security effectiveness and potential issues.
Chart Categories
- Authorized (Green): Successful access attempts with valid, active cards
- Denied (Red): Rejected attempts due to expired, invalid, or unauthorized cards
- Unknown (Gray): Unrecognized cards or system read errors
The center number shows the total count of authorized attempts, representing successful facility access events.
Healthy Distribution Indicators
What to expect in a well-managed system:
- ✅ 95%+ Authorized: Most attempts should be successful
- ✅ < 5% Denied: Small percentage from occasional expired cards
- ✅ ~0% Unknown: Should be minimal or zero in normal operation
Warning Signs
Unusual distributions that require immediate attention:
- 🔴 High Denied Rate (> 10%): Many expired cards or unauthorized access attempts
- 🔴 Many Unknown Cards (> 5%): Unregistered cards, damaged readers, or security breach
- 🔴 Sudden Spike in Denials: Mass card expiration or system misconfiguration
- 🔴 Zero Activity: System may be offline or not recording properly
Recent Denied Access Attempts
The Denied Access Attempts table is your primary security monitoring tool, displaying all rejected access attempts with full details for investigation and response.
Table Columns
- User: Name or identifier of person/card attempting access
- Description: Reason for denial (expired card, invalid card, no permissions, etc.)
- Date: Timestamp of denied attempt (YYYY-MM-DD HH:mm:ss format)
- Count: Number of consecutive denied attempts (indicates persistence)
Common Denial Reasons
| Description | Cause | Action Required |
|---|---|---|
| Card Expired | Expiration date passed | Renew card with new expiry date |
| Invalid Card | Card not registered in system | Investigate source, register if legitimate |
| No Access Permission | Card lacks zone authorization | Assign appropriate zone access |
| Card Suspended | Administratively disabled | Verify reason, reinstate if appropriate |
| Outside Schedule | Access attempted outside allowed hours | Adjust schedule or deny if correct |
Investigation Priority
Focus your security investigations on:
- Count > 5: Indicates determined unauthorized access attempts
- Unknown Users: Unregistered cards are security red flags
- After Hours: Denials at 23:00-5:00 require immediate review
- Same User Repeatedly: May indicate forgotten card renewal or malicious activity
- Unknown Cards: Priority investigation - potential security threat
- Document Actions: Log all investigations and resolutions
Time Period Filtering
The time period selector allows you to analyze access control patterns across different timeframes, revealing trends and identifying anomalies specific to each duration.
Available Time Periods
| Period | Label | Security Use Case |
|---|---|---|
| 24 Hours | 24h | Real-time security monitoring, daily access review |
| 7 Days | 7d | Weekly patterns, identify unusual weekly activity |
| 1 Month | 1m | Monthly security reports, card expiration trends |
| 6 Months | 6m | Semi-annual audit, seasonal access changes |
| 4 Years | 4y | Historical analysis, long-term security trends |
Analysis Use Cases
- 24h View: Morning security check, investigate overnight activity
- 7d View: Weekly reporting, identify day-of-week patterns
- 1m View: Monthly security audits, card renewal planning
- 6m View: Seasonal staffing analysis, budget forecasting
- 4y View: Facility growth trends, system capacity planning
Filter Effects on Data
When you change the time filter:
- ✓ Hourly Entrances chart recalculates for selected period
- ✓ Access Card Types distribution updates with period's data
- ✓ Denied Attempts table filters to show only period's rejections
- ✗ Total/Active/Expired card counts show current inventory (not filtered)
Security Insights & Analysis
Extract actionable security intelligence from your access control statistics to improve facility security and operational efficiency.
Proactive Monitoring
Key metrics to watch daily:
- Denied Attempts Spike: > 10% increase indicates problem
- Expired Card Growth: Rising count means renewal backlog
- Unknown Card Appearance: Immediate security concern
- After-Hours Access: Verify legitimacy of 22:00-6:00 entries
Trend Analysis
Compare periods to identify patterns:
- Week-over-week: Spot immediate changes in access behavior
- Month-over-month: Track seasonal variations and staffing changes
- Year-over-year: Measure facility growth and capacity needs
Operational Optimization
- Staff Scheduling: Align security staff with peak access hours
- Reader Placement: High-traffic hours indicate need for additional readers
- Maintenance Windows: Low-activity hours ideal for system maintenance
- Card Issuance: Batch renewals before expiration spikes
Best Practices
Follow these security-focused recommendations to maximize access control effectiveness and maintain robust facility security.
Daily Security Monitoring
- ✅ Review 24h view every morning to check overnight activity
- ✅ Investigate any denied attempts with Count > 3 immediately
- ✅ Verify that access patterns match expected facility schedule
- ✅ Check for unknown cards and investigate source
- ✅ Monitor expired card count - renew proactively before users locked out
Card Management Excellence
- ✅ Send expiration reminders 30 days before card expires
- ✅ Deactivate cards immediately when employee leaves
- ✅ Audit active cards quarterly - verify all match current users
- ✅ Maintain 5-10% spare card inventory for immediate issuance
- ✅ Set appropriate expiration periods based on user type (temp vs permanent)
Security Response Procedures
- ✅ Establish clear escalation process for security events
- ✅ Set up automated alerts for after-hours access attempts
- ✅ Document all denied attempt investigations and resolutions
- ✅ Coordinate with video surveillance for visual verification
- ✅ Implement lockdown procedures for multiple unknown card attempts
Data Retention & Privacy
- ✅ Define access log retention period per regulatory requirements
- ✅ Restrict statistics access to authorized security personnel only
- ✅ Anonymize data when sharing for operational analysis
- ✅ Export and archive historical data before purging
- ✅ Comply with GDPR, CCPA, and local privacy regulations