
The same user, the same group, or a member of the same group can be granted write
access or read+write access only for a device below this device in the device hierarchy.
Example 2—If a user or group is allowed write access for a device or class of devices:
The same user, the same group, or a member of the same group can be denied write
access or read+write access only for the same device or a device below this device in the
device hierarchy.
Example 3—If a user or group is allowed read access for a device or class of devices:
The same user, the same group, or a member of the same group can be denied read
access or read+write access only for the same device or a device below this device in the
device hierarchy.
Example 4—If a user or group is denied read access for a device or class of devices:
The same user, the same group, or a member of the same group can be granted access or
read+write access only for a device below this device in the device hierarchy.
Example 5—If a user or group is allowed read+write access for a device or class of
devices:
The same user, the same group, or a member of the same group can be denied write
access or read+write access only for the same device or a device below this device in the
device hierarchy.
Example 6—If a user or group is denied read+write access for a device or class of devices:
The same user, the same group, or a member of the same group can be granted read
access or read+write access only for a device below this device in the device hierarchy.
Denying access to a user or group
To prevent a user or group from accessing a device or a class of devices:
1. In the left pane of HP ProtectTools Administrative Console, click Device Access Manager, and
then click Device Class Configuration.
2. In the device list, click the device class that you want to configure.
● Device class
●
All devices
●
Individual device
3. Under User/Groups, click the user or group to be denied access, and then click Deny.
4. Click Apply.
NOTE: When deny and allow settings are set at the same device level for a user, denial of access
takes precedence over allowing access.
Setup Procedures 49
Comentarios a estos manuales