Although it might not be the most efficient approach, the reality is that just about every report item can be secured individually. Some things that don't follow this rule are subscriptions and schedules because they are used in conjunction with a report and not as an independent part of it. Table 18.1 describes how report items and their security work. Table 18.1. Report Items and Effects of Security
|