The user can:
Change their own credentials.
View and monitor the protection of the groups/subgroups assigned to them.
If a user has monitoring permissions on a group, they will also have them on all its subgroups.
If a user has monitoring permissions on a group and later a subgroup is added to that group, the user will automatically have monitoring permissions on the newly created subgroup.
View the profiles assigned to the groups/subgroups on which they have permissions.
View searches for unprotected computers performed from computers belonging to groups/subgroups on which they have permissions.
View uninstall tasks for groups/subgroups on which they have permissions.
View reports (on-demand reports) on groups/subgroups on which they have permissions.
View tasks to send reports on groups/subgroups they have permissions on, provided those permissions apply to all the groups/subgroups covered in the report. Otherwise, they will not be able to view the report sending task.
Related topics