P Sujaymeendra D.

GXP IT Auditor | Computer Systems Validation | Computer Software Assurance | Lead Auditor ISO 9001:2015 | ISMS 27001:2013 | Life Science-IT | Certified Scrum Master I

4 年

In this case, the access to the D drive should be restricted for operators/users and hide the desktop icons as part of the security..

回复

要查看或添加评论,请登录

Mohamed Anvar Deen的更多文章