Tips for Securely Managing Secondary Users
Follow these tips to help ensure that your secondary users do not present a security risk to your organization.
- Regularly audit your Users list to remove terminated employees
- Do not give users access to all computers in your account unless absolutely necessary
- When adding users on the Invite users to access your computers page, be sure to Specify the groups and computers the selected user can access
- Do not give One2Many access to unless absolutely necessary (since, in the wrong hands, One2Many can be used to distribute harmful files)
- When adding users on the Invite users to access your computers page, be sure this option is NOT selected: Run One2Many tasks