Physical Security Requirements for P6 EPPM

Previous TopicNext TopicContents

You should physically secure all hardware hosting P6 EPPM to maintain a safe implementation environment. Consider the following when planning your physical security strategy:

Related Topics

Safe Deployment of P6 EPPM

Administrative Privileges Needed for Installation and Operation

Minimum Client Permissions Needed for P6 and P6 Team Member Web

Minimum Client Permissions Needed for P6 Professional

Application Security Settings in P6 EPPM

Files to Protect after Implementation



Legal Notices
Copyright © 1999, 2016, Oracle and/or its affiliates. All rights reserved.

Last Published Thursday, February 04, 2016

PDF Library