Monitoring permission

 

Users can:

  1. Modify their user credentials.

  2. View and monitor the protection of the groups/subgroups assigned to them.

  1. View the profiles assigned to the groups/subgroups on which they have permissions.

  2. View searches for protected computers performed from computers belonging to groups/subgroups on which they have permissions.

  3. View uninstallation tasks for groups/subgroups on which they have permissions.

  4. View reports (immediate reports) about groups/subgroups on which they have permissions.

  5. View tasks to send reports about groups/subgroups they have permissions on, provided those permissions apply to all the groups/subgroups covered in the report. Otherwise they will not be able to view the report sending task.