Anviz T60 Pro Quick start guide

Type
Quick start guide

Anviz T60 Pro is an intelligent security device designed to provide access control and security features for various applications. With its versatile capabilities, it offers a comprehensive solution for managing access, monitoring events, and ensuring the safety of your premises.

Key Features:

  • Access Control: Manage and control access to your premises by granting or denying entry to authorized individuals using fingerprint recognition, card readers, or exit buttons.

  • Event Monitoring: Keep track of all access events, including successful and failed attempts, along with the corresponding timestamps and user information. This data can be used for auditing purposes or to identify suspicious activity.

Anviz T60 Pro is an intelligent security device designed to provide access control and security features for various applications. With its versatile capabilities, it offers a comprehensive solution for managing access, monitoring events, and ensuring the safety of your premises.

Key Features:

  • Access Control: Manage and control access to your premises by granting or denying entry to authorized individuals using fingerprint recognition, card readers, or exit buttons.

  • Event Monitoring: Keep track of all access events, including successful and failed attempts, along with the corresponding timestamps and user information. This data can be used for auditing purposes or to identify suspicious activity.

  • Page 1 1
  • Page 2 2

Anviz T60 Pro Quick start guide

Type
Quick start guide

Anviz T60 Pro is an intelligent security device designed to provide access control and security features for various applications. With its versatile capabilities, it offers a comprehensive solution for managing access, monitoring events, and ensuring the safety of your premises.

Key Features:

  • Access Control: Manage and control access to your premises by granting or denying entry to authorized individuals using fingerprint recognition, card readers, or exit buttons.

  • Event Monitoring: Keep track of all access events, including successful and failed attempts, along with the corresponding timestamps and user information. This data can be used for auditing purposes or to identify suspicious activity.

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI