This figure shows the following first security implementation process:

  1. Access Security interface

  2. Set Security preferences

  3. Add users

  4. Create groups

  5. Add Security administrators

  6. Add users to groups

  7. Assign permissions