You may enter a unit number to start displaying the status with that unit, or simply press the down arrow key to scroll through the list of temperature zones. The status display is as shown under Temperature Control, except that now the arrow keys may be used to continue scrolling.
TSTAT | 1 |
MODE: | AUTO FAN: AUTO |
At this point, you may press the ' # ' key to control the temperature zone as specified under Temperature Control.
The Energy Cost Status menu allows you to view the current energy rate in use.
The Energy Cost will display Lo, Mid, Hi or Crit (for critical) energy rates.
The Event Log records the 250 most recent significant security system Events (happenings) and trouble conditions in the system. When a new event occurs, the oldest one is lost.
The following Events, along with the time and date of their occurrence are recorded in the Event Log when they occur:
All Security system Armings and disarmings (Off, Day, Night, Away, and Vacation), and user name. All zones bypassed or restored by the user, and user name.
Any zone automatically bypassed by the system. Any zone tripped while the security system is armed.
Any trouble condition (zone, battery, fuse, AC power, or phone).
The restoration of any trouble condition (the trouble condition ceased to occur). Any Remote Telephone Access, Remote Access Denied, or Remote PC Access.
Show Events
To view your event log, from the
Each event log entry displays the time and date on the top line and a description of the event on the bottom line:
7:15 | PM | 5/8 |
USER | NAME | AWAY |
For trouble conditions, the event log will show the zone name or specific trouble condition and "TROUBLE":
10:59 AM 5/8
BATTERYTROUBLE
For trouble restorations, the event log will show the zone name or specific trouble condition and "TRBL RST":
11:57 AM | 5/8 |
BATTERY | TRBL RST |
The system records each remote access. A remote phone access is when someone calls into the system from an outside phone line. Remote phone access is also recorded if the system phones out in response to an alarm and the called party enters a code. The event log displays the code used to access the system and "REM ACCESS":
12:05 PM | 5/8 |
USER NAME | REM ACCESS |
Page 29