4. Preventing Leakage of Information from Machines
5.
Press [Program/Change/Delete] for "Permissions for Users / Groups", under "Protect
Destination".
6.
Press [New Program].
7.
Select the users or groups to which to apply access permissions.
You can select multiple users.
By pressing [All Users], you can select all users.
8.
Press [Exit].
9.
Select the user to whom you want to assign access permissions, and then specify the
permission.
Select one of [Read-only], [Edit], [Edit / Delete], or [Full Control].
10.
Press [Exit].
11.
Press [OK].
12.
Log out.
• "Edit", "Edit / Delete", and "Full Control" access permissions allow users to perform operations that
could result in loss of or changes to sensitive information. We recommend you only grant the
"Read-only" permission to general users.
52