Good morning, Guys!
Just a very quick 'Access Security' question which I have never really been clear on at all
(Did check the relevant faqs on Microsoft support et al, - but still a bit muddled!):
When implementing Access security does one split the datebase before or after implementing security??
Many thanks in advance.
Best wishes,
[Highlight]Magnetar[/Highlight]
![[atom] [atom] [atom]](/data/assets/smilies/atom.gif)
Just a very quick 'Access Security' question which I have never really been clear on at all
(Did check the relevant faqs on Microsoft support et al, - but still a bit muddled!):
When implementing Access security does one split the datebase before or after implementing security??
Many thanks in advance.
Best wishes,
[Highlight]Magnetar[/Highlight]
![[atom] [atom] [atom]](/data/assets/smilies/atom.gif)