This figure shows the following first security implementation process:
Access Security interface
Set Security preferences
Add users
Create groups
Add Security administrators
Add users to groups
Assign permissions