Patrol Procedures Protocol: Standard Operating Procedures for Guard Tours
A comprehensive patrol protocol covering checkpoint sequences, observation techniques, documentation requirements, and response procedures for security officers.

Effective patrol is more than walking a route. It requires systematic observation, proper documentation, and knowing how to respond when something is wrong. This protocol provides the foundation for professional guard tour operations.
Patrol procedures cover pre-patrol preparation, systematic observation techniques, checkpoint verification, documentation standards, and response protocols. Consistent execution builds client confidence and catches security issues early.
Purpose
This protocol establishes standard procedures for conducting security patrols to ensure consistent coverage, thorough observation, proper documentation, and appropriate response to discovered conditions.
Pre-Patrol Preparation
Before beginning each patrol, the officer shall:
- Equipment check: Verify radio, flashlight, keys, phone, and any required PPE are functional
- Review post orders: Confirm current patrol route and any special instructions for the shift
- Check communications: Test radio with dispatch/base
- Review recent activity: Check logs for ongoing situations or areas requiring extra attention
- Weather assessment: Note conditions that may affect patrol (wet floors, icy surfaces, reduced visibility)
Patrol Patterns
Route Variation
Predictable patrols are less effective. While checkpoint sequence may be fixed, vary your approach when possible:
- Alternate starting points when permitted
- Vary timing within acceptable windows
- Occasionally reverse direction
- Take different paths between checkpoints
Patrol Frequency
| Patrol Type | Typical Frequency | Notes |
|---|---|---|
| Interior rounds | Every 1-2 hours | More frequent during high-risk periods |
| Exterior perimeter | Every 2-4 hours | Weather dependent |
| Parking structure | Every 1-2 hours | Increase during shift changes |
| Loading dock | During active hours + random | Focus on delivery times |
Observation Techniques
The SCAN Method
- S - Sight: Look for visual anomalies, damage, unauthorized persons
- C - Compare: Note what's different from your last patrol
- A - Assess: Evaluate potential risks or issues found
- N - Note: Document everything significant
What to Look For
Security Concerns
- Doors/windows unsecured that should be locked
- Signs of forced entry or tampering
- Unauthorized persons in restricted areas
- Suspicious vehicles or packages
- Alarm panel status changes
- CCTV camera positions (moved or obstructed)
Safety Hazards
- Wet floors, spills, trip hazards
- Blocked fire exits or extinguishers
- Burned out lights in stairwells/parking areas
- Propped open fire doors
- Damaged railings or walkways
- Unusual odors (gas, smoke, chemicals)
Facility Conditions
- Water leaks or flooding
- HVAC issues (unusual temperatures)
- Equipment running that shouldn't be
- Overflowing trash or unsanitary conditions
- Vandalism or graffiti
Checkpoint Verification
Verification Methods
| Method | Procedure | Advantages |
|---|---|---|
| NFC/RFID tap | Hold phone/device near tag until confirmation | Tamper-proof, automatic timestamp and location |
| QR code scan | Open scanner, capture code until confirmed | Visual verification, works with phone camera |
| GPS verification | System auto-confirms when in geofenced area | No physical action needed, proves location |
| Photo capture | Take timestamped photo of checkpoint area | Visual proof of presence and conditions |
Checkpoint Best Practices
- Scan checkpoints in sequence as specified in post orders
- Don't rush—take time to observe the area around each checkpoint
- Report damaged or missing checkpoint markers immediately
- If checkpoint is inaccessible, document reason and notify supervisor
Documentation Standards
During Patrol
Log entries should include:
- Time: Exact time of observation
- Location: Specific area (not just "building")
- Observation: What you found (factual, objective)
- Action taken: What you did in response
- Follow-up needed: Any required next steps
Example Log Entries
Good: "0230 - North stairwell, 3rd floor: Emergency exit door found propped open with wooden wedge. Removed wedge, secured door, verified alarm reset. Will monitor on next round."
Poor: "0230 - Checked stairwell, all good."
Response Procedures
Priority Levels
| Priority | Response | Examples |
|---|---|---|
| Immediate (Life Safety) | Radio immediately, take protective action | Fire, medical emergency, active threat |
| Urgent (Security Breach) | Radio promptly, investigate safely | Open secure door, person in restricted area |
| Routine (Maintenance) | Document, report at end of patrol | Burned out light, minor leak, debris |
| Informational | Note in log for awareness | After-hours worker present, vehicle left overnight |
Discovering a Security Breach
- Stop and assess from a safe distance
- Do NOT enter if threat may still be present
- Radio for backup immediately
- Maintain visual on the area if safe to do so
- Note descriptions of any persons/vehicles
- Preserve the scene for investigation
Night Patrol Considerations
- Use flashlight systematically, not randomly
- Allow eyes to adjust before entering dark areas
- Check behind and above, not just ahead
- Be aware of your silhouette against light sources
- Listen for unusual sounds—night is quieter
- Increase awareness in blind corners and stairwells
Vehicle Patrol Specifics
- Conduct walk-around before and after patrol
- Exit vehicle to check secured areas—don't just drive by
- Park strategically to observe while completing reports
- Note mileage at start and end of patrol
- Report any vehicle issues immediately
Key Takeaways
- Preparation before patrol prevents problems during patrol
- Vary patterns to avoid predictability
- Use SCAN method: Sight, Compare, Assess, Note
- Document observations with specific details
- Know priority levels and appropriate responses
- Never investigate potential threats alone—call for backup
Written by
TeamMapTeam
TeamMap builds modern workforce management tools for security teams, helping companies track, communicate, and coordinate their field operations.
Continue Reading

Offline Mode Operations: TeamMap Procedures for Low-Connectivity Areas
Maintain security operations when connectivity is limited. Covers TeamMap's offline capabilities, data sync procedures, and contingency workflows.

Visitor Management Kiosk Setup: TeamMap Self-Service Check-In
Deploy TeamMap's visitor kiosk for self-service check-in. Covers kiosk setup, host notifications, badge printing, and visitor log management.

Team Channel Communication Guide: TeamMap Chat Best Practices
Set up and manage TeamMap channels for different sites, teams, and incident types. Includes communication protocols and channel organization strategies.