Users can:
View all users created on the system.
Remove users.
Users can:
Create and delete groups/subgroups.
If a user has total control permissions on a group, they will also have them on all its subgroups.
If a user has total control permissions on a group and later a subgroup is added to that group, the user will automatically have total control permissions on the newly created subgroup.
Configure the protection profiles of all groups.
Assign computers to all groups/subgroups.
Move computers from one group/subgroup to another.
Edit the Comments field in the Computer details window.
Access all computers remotely.
Users can:
Copy profiles and view the copies made of all profiles.
Configure scheduled scans of specific paths for any profile.
View reports (non-scheduled, 'immediate' reports) about any group.
Create tasks to send scheduled reports about any group
View all report sending tasks.
Users can:
Configure searches for unprotected computers
View and/or remove any of the tasks created.
Users can:
Configure protection uninstallation tasks.
View and/or remove any of the tasks created.
Users can:
Use the option to add licenses using the activation code.
Use the option to merge accounts.
Delegate security management to a partner.