Skip to main content
All Features

Visitor Security Screening

Three configurable security tiers that match screening depth to your facility requirements. From basic sign in to full ID verification with NDA signatures and mandatory host approval.

visitorlog.io
VisitorLog security settings showing three screening tiers with toggle controls

Key Capabilities

  • Three Security ModesSwitch between Standard, Enhanced, and High Security per facility
  • NDA Signature CaptureVisitors read and digitally sign an NDA during check-in
  • Host AuthorizationHosts approve or deny visitors via email or SMS before entry
  • ID VerificationCapture 7+ document types including passport, driver license, and CAC
  • Escort TrackingAssign escorts to visitors and track escort activity
  • Vehicle CaptureRecord vehicle make, model, color, and plate number

How It Works

Not every building needs the same level of visitor screening. A coworking space has different security requirements than a defense contractor. I designed VisitorLog's visitor security screening with three configurable tiers so you can match the check in process to your actual risk profile, facility by facility. You pick the level that fits and change it anytime.

Standard mode captures basic visitor information like name, company, host, and reason for visit. This works well for general office environments where you want a record of who entered the building without creating a bottleneck at the front door. The check in form stays short and visitors move through quickly. Enhanced mode adds ID verification and NDA signature capture. Visitors select from seven document types (including passport, driver license, military ID, and CAC) and acknowledge their identification during check in. If your facility requires a nondisclosure agreement, visitors read the NDA text on screen and provide a drawn signature with their finger or stylus. The signature is stored alongside their check in record for legal and audit purposes. This tier works well for tech companies, law firms, and any environment where intellectual property protection matters.

High security mode goes further by requiring host authorization before a visitor can enter. When someone checks in under high security, the named host receives a notification by email or SMS and must explicitly approve or deny the visit. Until the host responds, the visitor waits. There is no automatic entry. This tier also supports escort tracking with a dedicated escort role. Assigned escorts receive notifications when their visitor arrives and the system tracks the escort assignment alongside the visit record. For defense contractors and government facilities where CMMC or NIST 800 171 compliance requires visitor escort procedures, this built in tracking satisfies the documentation requirement.

Vehicle capture is available at all tiers and records make, model, color, and license plate number. For facilities with parking management requirements or sites where vehicle identification is part of the security protocol, this data feeds into the audit trail alongside every other visitor action. Each facility configures its own security tier independently, so your headquarters can run high security while regional offices use standard mode. Switching tiers takes one click in settings and applies immediately to the next visitor who checks in. There is no downtime, no reconfiguration, and no need to retrain your front desk staff. The screening form adjusts itself automatically.

Frequently Asked Questions

What types of ID can visitors present for verification?
VisitorLog supports seven document types for ID verification including passport, driver license, state ID, military ID, CAC (Common Access Card), permanent resident card, and other government issued identification.
How does the NDA signature capture work during check in?
Visitors read the NDA text displayed on the check in screen and sign with their finger on a mobile device or stylus on a tablet. The drawn signature is stored with the check in record and available for audit or legal review.
Can different facilities use different security screening levels?
Yes. Each facility configures its own security tier independently. Your corporate headquarters can require host authorization and ID verification while satellite offices use standard check in with just basic visitor information.

Try it free

No credit card, no trial period. Create your account and start managing visitors in minutes.