MANUALS > G/L Interface > G/L Interface Module > G/L Interface, Print Menu > Inventory Costing (Print)
Inventory Costing (Print)
The Inventory Costing Print window allows the user to print then view reports that contain Inventory Costing information.
This window and the print options in this window are security controlled via Security Explorer/ G/L Interface/ Print/ Inventory Costing. For additional information, refer the the Security Explorer, via the System Administration Training Manual.

Note: The Prints reports in the Inventory Costing window have an Excel Export limitation of 20,000 lines.
Note: These are customized prints. Print layouts and options may vary per operator.
The following information/options are available in this window: _____________________________________________________________________________________
Fixed Asset
An asset intended for long term use.
Other
Non-fixed assets.
Company
The associated parent company for the G/L Account.
Print Name
The name of the print to be used for filtering purposes.
DW Name
The data window name where the print is applicable.
_____________________________________________________________________________________
The Print button is used to generate the report in the Print Queue. For more information, please refer to the Print Queue topic.
The Print Preview button can be selected to view a pdf sample of the print. This preview opens in a new window.
The Schedule Print button can be selected to allow users to schedule specific prints with unique filters to be automatically generated through a pre-configured schedule. For more information, please refer to the Schedule Print button topic.
The Export as Excel button can be selected to view the queried data (including all pages) in an Excel spreadsheet. This Excel file can be saved for later use. For more information refer to the Export as Excel Button via the eMRO System Standards manual.
Note: The Export as Excel print functionality is security controlled via System Administration/Update/Logged In Session/Excel Export Functionality. For more information, refer to the Security Explorer via the System Administration Training manual.
|