Users can:
Modify their user credentials.
View and monitor the protection of the groups/subgroups assigned to them.
If a user has monitoring permissions on a group, they will also have them on all its subgroups.
If a user has monitoring permissions on a group and later a subgroup is added to that group, the user will automatically have monitoring permissions on the newly created subgroup.
View the profiles assigned to the groups/subgroups on which they have permissions.
View searches for protected computers performed from computers belonging to groups/subgroups on which they have permissions.
View uninstallation tasks for groups/subgroups on which they have permissions.
View reports (immediate reports) about groups/subgroups on which they have permissions.
View tasks to send reports about groups/subgroups they have permissions on, provided those permissions apply to all the groups/subgroups covered in the report. Otherwise they will not be able to view the report sending task.