• Publish date: November 04, 2021

  • Last update: November 04, 2021

Available languages

English

GEN-7 SunSystems Security Console is a self-paced course for system administrators to manage user access and security permissions. Learn to create accounts, manage access rights, and maintain data integrity with security best practices.

About GEN-7 – Infor SunSystems v6.4 Security Console

The SunSystems Security Console is a versatile tool that offers a range of functions to manage users, groups, and security options.

Security Console

In this course, we will delve into the depths of Infor SunSystems Security Console to explore its diverse functions, which include setting up new users, managing groups of users, security policies, services, databases, and user activity, auditing security settings, and generating reports.

After Completion.

After completing this course, you will gain an in-depth understanding of SunSystems settings enabling you to explain them to anyone who wants to know about th

Who should take this course?

  • System Administrator

    As a system administrator, mastering the security console functions of SunSystems is crucial for managing users, groups, and security options.

  • New User

    As such, this course is tailored to equip new SunSystems users with the essential knowledge they need to succeed.

In this course, you will learn…

SunSystems Security Console is a complex and powerful tool that requires specialised knowledge and skills to be used effectively. With the Security Console module, administrators can effectively oversee and control essential functions that could significantly impact the security and authenticity of financial information.

To help you master this essential function, we have divided the course into multiple bite-sized chapters focused exclusively on the Security Console.

  • Chapter 1 – Welcome

  • Chapter 2 – Foundation

    This chapter delves into the fundamentals, from logging in and out of the system to resetting your password and other nifty tricks.

  • Chapter 3 – Security Users

    In this chapter, you will learn how to use Security Control functions to set up and manage users. This includes editing existing user details, copying user information, locking and unlocking user accounts, and deleting users.

  • Chapter 4 – Security Groups

    In this chapter, the focus is on managing user groups by creating and assigning them to ensure that the right group has access to the appropriate data.

  • Chapter 5 – Security Setting

    Learning about Security Settings will enable you to manage settings, such as security policy, service, database, and user activity, define your security policy, and modify function extensions.

  • Chapter 6 – Security Audit

    After thoroughly exploring the Security Console, the next step is to set up and run audits of your security settings, which this chapter covers. You will learn how to define the content of an audit, set up audit trails, and archive audit data for future reference.

  • Chapter 7 – Security Report

    This chapter will cover how to generate two reports in SunSystems Security: the Operator Setup Report, which lists all active operators for monthly revision, and the User Group Permission Report, which lists all access granted to a specific group or multiple groups.

Why take this course

  • Security Console is a complex and powerful module of SunSystems. This course is designed to enable system administrators like you to fully utilise the tool and thus effectively manage access and security permissions, which are critical functions that must be performed accurately to ensure the security and integrity of financial data.

  • Tighten your security and strengthen the quality of your most valuable assets, your financial data, with this course.

Courses to take after completing GEN-7

  • · GEN-13 Infor SunSystems V6.4 User Manager

    Learn all you need to know about SunSystems User Manager, a client application providing a user interface for managing users, groups, and security options.

Course curriculum

  • 1

    Welcome

  • 2

    Foundation

    • Introduction

    • Login

    • Logout

    • Change Password

    • Change Business Unit

    • Home page and Navigation

    • Learning Check

  • 3

    Users

  • 4

    Groups

    • Introduction

      FREE PREVIEW
    • Create a group

      FREE PREVIEW
    • Hands-on: Create a user group

    • Hands-on: Create a user group with instructions

    • Edit a group

    • Copy a group

    • Hands-on: Edit & Copy a user group

    • Hands-on: Edit & Copy a user group with instructions

    • Delete a group

    • Restore a group

    • Hands-on: Delete and Restore a user group

    • Hands-on: Delete and Restore a user group with instructions

    • Learning Check

  • 5

    Security Settings

    • Introduction

      FREE PREVIEW
    • An overview of Security Settings

      FREE PREVIEW
    • Define your Security Policy

    • Hands-on: Define security policy

    • Hands-on: Define security policy with instructions

    • Function Extensions

    • Hands-on: Use function extensions to create menu items

    • Hands-on: Use function extensions to create menu items with instructions

    • Add a Data Access Group

    • Edit a Data Access Group

    • Delete a Data Access Group

    • Hands-on: Add, Edit, and Delete a Data Access Group

    • Hands-on: Add, Edit, and Delete a Data Access Group with instructions

    • Manage User Activity

    • Hands-on: Clear SunSystems user activity

    • Hands-on: Clear SunSystems user activity with instructions

    • Learning Check

  • 6

    Security Audit

    • Introduction

      FREE PREVIEW
    • An overview of Security Audit

      FREE PREVIEW
    • Audit Policy

    • Hands-on: Define audit contents

    • Hands-on: Define audit contents with instructions

    • Audit Extract

    • Hands-on: Create and Run the audit extract

    • Hands-on: Create and Run the audit extract with instructions

    • Audit Archive

    • Hands-on: Store the historical information

    • Hands-on: Store the historical information with instructions

    • Learning Check

  • 7

    Reporting

    • Introduction

      FREE PREVIEW
    • Operator Set Up Report

      FREE PREVIEW
    • Hands-on: Run an Operator Set up report

    • Hands-on: Run an Operator Set up report with instructions

    • User Group Permission Report

    • Hands-on: Run User Group Permission report via RMA

    • Hands-on: Run User Group Permission report via RMA with instruction

    • Learning Check

  • 8

    Summary & Next Steps

    • Summary & What happens next?

    • Help us improve your learning experience