Endpoint Protection includes three types of permissions. The permission assigned to a user will dictate which actions they can take, and on which computers or groups.
The actions that a user can take affect basic and advanced aspects of the protection, and include the creation and modification of their own user credentials, the configuration and assignment of user groups and profiles, the generation of different kinds of reports, etc.
The permissions that exist are:
Select a type of permission to view more detailed information. Use the different permissions to assign different duties to the members of your team and get the most out of the security features provided by Endpoint Protection.