Safe Deployment of P6 EPPM
To ensure overall safe deployment of P6 EPPM, you should carefully plan security for all components, such as database servers and client computers that are required for and interact with P6 EPPM. In addition to the documentation included with other applications and hardware components, follow the P6 EPPM-specific guidance below.
Related Topics
Administrative Privileges Needed for Installation and Operation
Minimum Client Permissions Needed for P6 and P6 Team Member Web
Minimum Client Permissions Needed for P6 Professional
Physical Security Requirements for P6 EPPM
Application Security Settings in P6 EPPM
Files to Protect after Implementation
Last Published Thursday, October 31, 2024