You should physically secure all hardware hosting P6 EPPM to maintain a safe implementation environment. Consider the following when planning your physical security strategy:
Administrative Privileges Needed for Installation and Operation
Minimum Client Permissions Needed for P6 and P6 Team Member Web
Minimum Client Permissions Needed for P6 Professional
Application Security Settings in P6 EPPM
Files to Protect after Implementation
Legal Notices
Copyright © 1999, 2017,
Oracle and/or its affiliates. All rights reserved.
Last Published Friday, February 09, 2018