In this hands-on demo accompanying Module 4, Guido Verbraak from IBM Expert Labs shows how to configure Db2 security settings in practice. Learn how to create users and groups at the OS level, grant privileges, connect with different user profiles, and verify access rights using command-line tools. This step-by-step walkthrough provides practical guidance for DBAs and system administrators looking to apply security best practices in real Db2 environments.