Download Wasp Inventory Control v5 Std Stock Control Software
Transcript
Chapter 2: Getting Started After you have installed InventoryControl, you need to enter your inventory information. There are various ways you can enter information in InventoryControl; however, to help you setup your system quickly and minimize mistakes, we have compiled a list of steps you should follow. By completing these steps in order, you can be assured that all of your information is entered correctly and efficiently. First, let’s take a brief look at the steps required for setting up your system. After that, we’ll talk about each step in depth and give you some industry specific examples to get you up and running in no time. Follow the steps below to begin populating your database. 1. 2. Setup Users and Assign Security Privileges Enter Your Company Information and all Shipping/Receiving 3. 4. 5. 6. 7. 8. 9. 10. Enter or Import Your Sites and Locations Create Location Labels for Barcode Scanning Enter or Import Your Suppliers Enter or Import Your Items Creating Item Labels for Barcode Scanning Adding Inventory to Your Items Printing the Inventory Location Report Audit Your Inventory Addresses Step 1: Setup Users and Assign Security Privileges When you first logon to InventoryControl, you will use Admin as the user name and leave the password blank. This default user profile gives you access to everything in the system. The first step you should take upon logging in is to create additional users on the Security screen. You should setup at TIP: Make sure you least one additional admin user who change the default “admin” user has rights to all areas of the system profile’s password. This and change the password for the password is initially blank and default admin user profile. Since the should be changed to prevent default admin’s password is initially others from logging into the blank, it is important to change the system under this profile. default admin’s password to prevent other users from logging in under this profile. You should eventually setup profiles on the Security screen for all users who will need access to the system. It is a good idea to give each user his or her own 16