User Guide
Upgrading from Previous Versions
Getting Started Guide
36
2
When user IDs and passwords are set up, Peachtree prompts you for a user ID
and password when you open a company. If you know the password, you can
access the areas of the program to which you have rights.
Passwords from previous versions of Peachtree Accounting Releases 5 (or
lower) are converted to user records in which the user ID and password are
the same value. For example, if you set up the password “peach” in Peachtree
Accounting Release 5, enter peach as the user ID and password. To
personalize the new user records and take advantage of the new limited access
features, select Users from the Maintain menu. Only passwords set up in
previous versions with access to the “Passwords” window have access to the
new Maintain Users window.
User IDs and passwords are case sensitive. Therefore, make sure you type the
user ID and password exactly as set up in the user record when opening your
Peachtree Accounting company. For example, Password, PASSWORD, and
password, are all different. If you're sure you have the right user ID and
password, but Peachtree isn't accepting them, check to see if your CAPS
LOCK key is on.
For more information, see the “Company Administration” chapter of the
User’s Guide.
Use Audit Trail
Peachtree Accounting has several methods to track information. For example,
the General Ledger, journals, reports, and financial statements can be used to
trace transactions and balances for audit purposes. However, if you want to
track when an action is performed in your company data, you can now
activate Peachtree Accounting’s audit trail. This is a security option that logs
when a person enters data, maintains (edits) existing data, and removes data.
Audit trail provides accountability of users, deters users from fraudulent
activity or mistakes, and tracks transaction history. The Audit Trail report can
trace fraudulent activity and other accounting adjustments you may not know
were completed.
If you intend to have Peachtree maintain an audit trail log, it is strongly
recommended that you set up users in your company. When the Use Audit
Trail option is activated and users/passwords set up and implemented, data
security will be increased substantially. The Audit Trail report can associate
user IDs with each data and system activity performed as it occurs and
establishes personal accountability.
For more information, see the “Company Administration” chapter of the
User’s Guide.