These are the procedures to set up and/or configure the software.
More on this topic...
Assigning permission to a Security Group
See also...
Delete Aged Data
Overview of Delete Aged Data
Using Delete Aged Data
Training Competencies for Delete Aged Data
Next >>