User accounts and privileges

Recommendations to optimize cybersecurity in a protected environment:

  • Assign users only the essential privileges needed to perform their role.

  • Revoke user privileges when no longer needed due to role change, transfer or termination. User credentials do not expire.

  • Follow user account management tasks as described by your organization or contact your network administrator.

QR code for this page

Was this helpful?