This guide outlines a detailed process for using facial recognition in a manual user system to enhance security, streamline identity verification, and control access. It explains how biometric algorithms capture and match facial features to stored data, ensuring only authorized access. Users will learn key operational steps, hardware needs, and safety considerations for effective system use.