Hello, my suggestion for you would be to just stick with Symantec’s suggestion. I had a similar problem when the company that I work for tried to implement Ghost into our environment. We tried to setup permissions based on what we thought would be needed. We ended running into several problems...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.