The potential to break a critical process when changing your security configuration is real. But with the proper investigation and analysis, security changes can occur without disrupting your business. During this session Carol Woodbury will provide the methods she uses to investigate a system prior to making changes. The goal is to give you the confidence to make IBM i Security changes (system value, user profile, object authority and more) with confidence and without fear of breakage.