Concepts Tasks Security Contents Introduction to Security Profiles Creating Security Profiles Security Profile Examples Site Security Setup Using APM security profiles, you can determine which actions users can perform on each APM object and which information users can view. For example, some users might be allowed to create and edit assets, while other users are only allowed to view them. In a multi-site implementation, you can also set different levels of security for objects and information contained in each site. You can create a library of security profiles each with different levels of security settings. A security profile can be linked to one or more supplementary profiles, inheriting the settings from these components. In a single-site implementation, each user will have one security profile. In a multi-site implementation, users might have one security profile for each site or a single profile that applies to all sites. Warning: Enabling macros on exported Excel worksheets creates the risk of opening your system to macro-based malware. If you decide to enable macros, we recommend setting up an APM security profile to restrict access to creating and editing macros. This section explains concepts related to security profiles, and how to create, edit, and work with security profiles.