Before you allow users to access the databases, check the integrity of the data. Follow the steps under Verify the Integrity of the Data.