The administrator could define login accounts and assign specific tasks (imaging, remote control, and so on) to those accounts creating roles. One person could be an imaging person (but might not have rights to remote control) while another could be a Helpdesk person with remote control rights (but not imaging). The problem is that these roles are not limited to which computers these tasks could be performed on.
Security roles have been combined with scope control. This gives the administrator the ability to:
Deployment Server 6.5