Gaming Machine Monitoring Device: 24/7 Protection Explained
Monitoring is not the same as blocking. A gaming machine monitoring device observes and records every transaction on the machine’s communication bus, providing visibility into machine operation that the machine’s own logging does not. It does not block unauthorized signals — blocking is the job of bus monitoring devices with active filtering. But a monitoring-only device provides value that blocking devices do not: historical data for revenue analysis, operational insights, and post-incident investigation records. This article explains what a monitoring device does, how it differs from a blocking device, and when to use one.
Monitoring vs Blocking: The Critical Distinction
A monitoring device observes and records. It does not block. This distinction is the most important thing to understand before purchasing any protection equipment.
A blocking device sits on the communication bus and actively stops unauthorized signals from reaching the mainboard. It protects revenue. It is the primary protection technology that every venue should deploy first.
A monitoring device sits on the bus and logs everything. It provides visibility, not protection. The signals it logs include both legitimate transactions and attack signals that were not blocked. The monitoring device tells you what is happening, but it does not stop it from happening.
When should you use a monitoring device? Two scenarios:
- Before deploying blocking devices: If you are not sure whether your venue has an attack problem, install monitoring devices on 3-5 machines for 2-4 weeks. The logs will show whether attack signals are present. If they are, proceed to blocking devices. If they are not, you have data supporting the decision to defer blocking protection.
- Alongside blocking devices: If you have already deployed blocking devices, monitoring devices provide an independent record that the blocking devices are functioning correctly. The monitoring log should show blocked attacks that the blocking device also logged. If the monitoring log shows attacks that the blocking device did not log, the blocking device may have a gap that needs investigation.
What a Monitoring Device Records
A monitoring device records every transaction on the bus, regardless of its legitimacy.
- Credit additions: Every credit increment, with timestamp and the signal’s electrical characteristics. Cross-referencing credit additions with cash collected identifies discrepancies.
- Payout events: Every payout, with timestamp and the signal that triggered it. Cross-referencing payouts with game results identifies unauthorized payouts.
- Game events: Every game start, result, and outcome change. This data enables analysis of win rates, session duration, and player behavior.
- System events: Every configuration change, firmware operation, and diagnostic event. This data enables detection of unauthorized access and configuration manipulation.
- Anomalous signals: All signals that do not match known patterns. These may be attack signals or benign anomalies. Cross-referencing anomalous signals with credit and payout events identifies which anomalies are attacks and which are benign.
The monitoring device stores all this data in its own memory, independent of the machine’s logging. If the machine’s log is suppressed by an attacker, the monitoring device’s log is not affected because it is recording independently.
How Monitoring Data Is Used
Revenue analysis: Compare credit additions logged by the monitoring device to cash collected during reconciliation. A persistent gap indicates revenue leakage. The monitoring data shows exactly when credits were added and which signals caused them, enabling targeted investigation.
Attack detection: Filter the monitoring log for anomalous signals. Cross-reference with credit additions and payouts. If an anomalous signal coincides with a credit addition or payout, it is likely an attack. The signal’s characteristics (frequency, modulation, timing) are recorded for analysis and can be shared with the blocking device vendor to add the attack signature to their database.
Operational insights: Use monitoring data to understand player behavior — which machines are most popular, which sessions produce the most revenue, and which games have the most replay value. This data informs machine placement, pricing, and game selection.
Compliance documentation: In regulated markets, monitoring data provides an independent audit trail that the machines are operating within regulatory parameters. The independent log (not alterable through the machine) provides stronger compliance evidence than the machine’s internal log.
Deploying Monitoring Devices
Pre-deployment survey: Install monitoring devices on 3-5 representative machines (different types, different locations in the venue) for 2-4 weeks. Download and analyze the logs weekly. Look for anomalous signals, credit-payment gaps, and unexpected patterns. If the analysis shows evidence of attacks, deploy blocking devices on all machines. If no evidence is found after 4 weeks, your venue’s risk level is lower, but blocking devices are still recommended for long-term protection against future attacks.
Post-blocking deployment: After blocking devices are installed on all machines, keep monitoring devices on 2-3 machines as verification checkpoints. The monitoring log should show blocked attacks that the blocking device also logged. Any discrepancy between the two logs is investigated.
Ongoing monitoring: Download logs weekly and review for anomalies. Even with blocking devices deployed, monitoring provides an independent verification that protection is functioning as expected.
Choosing a Monitoring Device
- Independence: The device must log independently of the machine. It should have its own memory, its own clock, and its own data export interface (USB, SD card, or network).
- Data format: The device must export logs in a standard format (CSV, JSON, or SQLite) for easy analysis. Proprietary formats that require vendor software to read are unacceptable.
- Log retention: The device should retain at least 30 days of transaction data. For high-volume venues, 90 days is recommended.
- Compatibility: The device must support the machine’s communication protocol. Most devices support RS-232, RS-485, and CAN bus, which covers the vast majority of machines. Verify protocol support with the vendor before purchasing.
- Cost: Monitoring-only devices are typically $50-150 per machine — significantly cheaper than blocking devices because they have simpler hardware (no active filtering circuitry).
Common Questions
Can I use a monitoring device instead of a blocking device?
Not if your goal is revenue protection. A monitoring device tells you you are losing revenue. A blocking device stops the loss. Monitoring alone leaves the attack gap open — you will see the attacks in the log but you will still lose the revenue. If you can afford either a monitoring device or a blocking device, always choose blocking.
How often should I check the monitoring logs?
Weekly for anomaly review. Monthly for full analysis and cross-referencing with revenue data. More frequently (daily) if you have confirmed attacks and are tracking an active investigation.
Can monitoring data be used as evidence?
Yes. The independent, timestamped, unalterable log is admissible evidence in legal proceedings and insurance claims. The device’s cryptographic log chain (if implemented) provides proof that the log has not been tampered with. Our guide covers evidence handling procedures.
Monitor to Understand. Block to Protect.
Monitoring and blocking serve different purposes. Monitoring tells you what is happening. Blocking stops what is happening from costing you money. Deploy monitoring first to understand your threat level. Then deploy blocking to protect your revenue. Keep monitoring running alongside blocking to verify that protection is working. The combination of monitoring (for visibility) and blocking (for protection) provides the most complete defense available.