In this intermediate course, we will review how your organization can customize user security and protect the integrity of your tables through group settings. We will review Operator Maintenance, Operator Departments, Security Configuration, and Security Group Settings.
