BioSyn

BioSyn Logo
Zkteco F17- How to Bypass Admin

The ZKTeco F17 is a biometric access control module designed for outdoor use. It features an IP65-rated waterproof and dustproof design, making it suitable for homes, offices, shops, garages, and factories.

Step 01

On the left side of the F17 there is a rubber flap. Open it up and find the little hole for the reset underneath the USB input. Take the end of a Paperclip and press it inside to push the reset button. The scanner will then restart.

How-To bypass Admin

Step 02

When the scanner is back on and the home screen appears, start pressing the Menu button fast and continuously for about 40 seconds. It will eventually just go into the Menu Section.

 Now you can go and change the password for the Administrator.

How-To bypass Admin

Step 03

Select User Manage and then Press OK.

How-To bypass Admin

Step 04

Select Enroll Admin and Press OK.

How-To bypass Admin

Step 05

Select Enroll Pwd (Password), then Press OK.

How-To bypass Admin

Step 06

Scroll down to Admin and then Press OK.

How-To bypass Admin

Step 07

You will then be asked if it is a New Enroll which in this case is not, so Press the ESC (Escape) button.

05-min

Step 08

Then Enter the Pin Code (6 Digits) of the administrator you want to change the password for, and Press OK.

06-min

Step 09

Input the New Password and Press OK.

07-min

Step 10

Affirm the New Password, then Press OK.

08-min

Step 11

Press OK to Save.

09-min

Step 12

You will then be asked if you want to continue with the change, then Press OK

10-min

Zkteco F17- How to Bypass Admin

To contact Biosyn about Bypassing Admin on your ZKTeco F17 device, call their sales team at the number provided on their website. Biosyn’s consultants can guide you through the setup process and explain how to configure the device for standalone or networked operations. 

Biosyn’s consultants provide expertise in configuring devices for both standalone and networked operations, ensuring a seamless integration. This involves guiding users through the setup process, which can be complex depending on the specific needs of the business or application, thereby enhancing overall efficiency and security.