Introduction Beginning in the 20.11.400 version, we have added an enhancement called Administrator Bypass Authorization. This functionality allows a specific user of Total Office Manager to enter their password to bypass the Administrator password entry. With this password entry, someone will now have the option to perform an Admin Override with a special password and […]
Introduction The Audit Trail in Total Office Manager will keep a record of all the changes made to transactions. Usage The audit trail function must be turned on, before it is applicable. Use the Audit Trail function to keep track of things like who used the add, edit, and delete features (this will eliminate, āit […]
Introduction Total Office Manager offers an extensive security feature. Ā When enabled, granting permission to users will require password level access to the software as a whole. Additionally, administrators can set security on nearly every single form and list used in the program. Ā This very robust security allows you to restrict what various users can do. […]
Introduction Total Office Manager offers your company very robust security. Security features allow you to restrict what various users can do. This topic deals with the subject of adding Total Office Manager users – specifically the user list. Usage Not every employee needs or even should be able to access all of your company data. […]
How to Make Lists and Forms Faster in Eight Simple Steps If your lists and forms are slow, unresponsive, or freeze, this article is for you. We will tell you how to easily make the software faster with ten actionable changes you can make right now. Spoiler Alter: Steps #1 through #3 will take about […]
Introduction Security can be set for each user on nearly every window/form in Total Office Manager. Ā The available security permissions are: View, Add, Edit, Void, and Delete. Depending on the current permission, an ‘X’ will appear if the user has that particular security permission on their profile. The Advanced Security Report shows how these security […]
Introduction Aptora Mobile II – User Security accessible from within the Aptora Mobile software from any device. Any user given permissions to do so can access the security portion of Aptora Mobile and the various related features, such as Change Password and the Audit Trail. Enabling Users to Access Aptora Mobile II Prior to setting […]