LHC Secure
When running LHC Secure you must designate one or more users to be the system administrator. Administrators have full access rights to all LHC controls and must make important decisions about workflow and file management.
The administrator needs to make decisions about:
- Where to store the database and protocol files: locally vs. network.
- What level of permissions to grant each user.
- Requiring users to enter comments for every audit trail event or not.
- Sending email alerts about certain events or not.
First:
- Develop a File Management Strategy .
- Consult your organization's information technology staff to determine which LHC Secure features to implement.
When the critical decisions have been made, you're ready to complete the System Administrator's Checklist .
Get started by learning about LHC Secure components:
Troubleshooting:
Slow Performance: If you notice a significant slow down in performance when viewing or reporting the audit trail, the database may be near its maximum capacity. Clean up the files to restore normal performance.