HRB1684301-15

User accounts and permissions

Recommendations to optimize cybersecurity in a protected environment:

  • Assign users only the essential permissions needed to perform their role.

  • Revoke user permissions when no longer needed due to role change, transfer or termination.

  • Follow user account management tasks as described by your organization or contact your network administrator.

QR code for this page

Was this helpful?