Users and Groups
To more easily manage network access, you
can combine users with similar needs and
restrictions into
groups
Table 8-1: Providing security through groups