Skip to main content

The setting up of user security within Jim2 should be considered very carefully, as it will obviously put restrictions on staff use of Jim2. Maintaining many users with various roles and their related security groups can be challenging.

Watch Ashley guide us through the steps needed to apply different security levels at user, group and role levels. This webinar also includes best practices for eliminating user security breaches and how to add and remove permissions.

  • Explore the security tab
  • Explore the security options
  • Create security groups
  • Evaluate security on reports
  • Review security status
  • Create a security plan
  • Consider roles in a business
  • Security Template Spreadsheet

We recommend adjusting the video quality setting on YouTube to 1080p for the best viewing experience.

Useful Resources

Here is everything you need to know about managing user securities in Jim2:

Jim2 Help Resources:

Past Webinar Resources:

  • Jim2 Upskill Webinar on Unprinting Jobs – Watch Now
  • Jim2 Upskill Webinar on End of Financial Year – Watch Now
  • Guide to Jim2 GST Sessions and Tax Codes – Watch Now
  • Performing a Stocktake in Jim2 –  Watch Now

Need assistance from the Jim2 Support Team?

Reach out to our support team with your questions on user security in Jim2.


    All fields are required to contact our customer support team.

    This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.