Data Security

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What is Setup Audit Trail?

Administrators can also view a Setup Audit Trail, which logs when modifications are made to your organization's configuration. For more information, see Monitor Setup Changes.

What are Record Modification Fields?

All objects include fields to store the name of the user who created the record and who last modified the record. This provides some basic auditing information. Login History

What access can you control on the Organization level in Salesforce?

At the highest level, you can secure access to your organization by maintaining a list of authorized users, setting password policies, and limiting login access to certain hours and certain locations.

How many levels of data access are there in Salesforce?

Four: 1. Organization 2. Objects 3. Fields 4. Records

What is the purpose of Auditing Usage?

It provides important information about system usage, which can be useful in diagnosing potential or real security issues

What access can you control on the Objects level in Salesforce?

Object-level security provides the simplest way to control which users have access to which data. By setting permissions on a particular type of object, you can prevent a group of users from creating, viewing, editing, or deleting any records of that object. For example, you can use object permissions to ensure that interviewers can view positions and job applications but not edit or delete them.

What is Manual Sharing?

This feature allows owners of particular records to share them with other users. Although manual sharing isn't automated like organization-wide sharing settings, role hierarchies, or sharing rules, it can be useful in some situations, for example, if a recruiter going on vacation needs to temporarily assign ownership of a job application to another employee.

What access can you control on the Records level in Salesforce?

To control data with greater precision, you can allow particular users to view an object, but then restrict the individual object records they're allowed to see. For example, record-level access allows an interviewer to see and edit her own reviews, without exposing the reviews of other interviewers. You can manage record-level access in these four ways.

What is Field History Tracking?

You can also enable auditing for individual fields, which will automatically track any changes in the values of selected fields. Although auditing is available for all custom objects, only some standard objects allow field-level auditing. For more information, see Tracking Field History.

What is Login History?

You can review a list of successful and failed login attempts to your organization for the past six months. For more information, see Monitoring Login History.

What access can you control on the Fields level in Salesforce?

You can use field-level security to restrict access to certain fields, even for objects a user has access to. For example, you can make the salary field in a position object invisible to interviewers but visible to hiring managers and recruiters.

What are Sharing Rules?

enable you to make automatic exceptions to organization-wide defaults for particular groups of users, to give them access to records they don't own or can't normally see. Sharing rules, like role hierarchies, are only used to give additional users access to records—they can't be stricter than your organization-wide default settings.

What are Role Hierarchies?

open up access to those higher in the hierarchy so they inherit access to all records owned by users below them in the hierarchy. Role hierarchies don't have to match your organization chart exactly. Instead, each role in the hierarchy should represent a level of data access that a user or group of users needs.

What are Organization-wide defaults?

specify the default level of access users have to each others' records. You use organization-wide sharing settings to lock down your data to the most restrictive level, and then use the other record-level security and sharing tools to selectively give access to other users.

What are the features of Auditing Usage?

1. Record Modification Fields 2. Login History 3. Field History Tracking 4. Setup Audit Trail


Set pelajaran terkait

Marketing 3.03 Product Mix Vocab.

View Set

Histology of nervous tissue chp 15

View Set

Chapter 6: Employment & Unemployment

View Set

Distributed Systems Chapter 4 Communication

View Set

Week 1 Assessment - Product and Platforms

View Set

Chapter 15 - Management of Oncologic Disorders

View Set

Technology For Teaching Chapter 9

View Set