In this chapter, we have gone through various security setting features available on Salesforce. Starting from OWD, followed by Sharing Rules and Field-Level Security, we also covered password policy concepts and two-factor authentication in Salesforce. Finally, we discussed Audit Trails, remote site settings, and Portal Health Check-ups. Now, you should be able to understand and manage Salesforce.com's security settings to have an efficient form of data security, providing a balance between security of data access for users and limiting risk of misuse and loss of data. In the next chapter, we will go through the e-mail administration concepts, and we will also cover how to change your Salesforce login page as well as concepts related to My Domain.
Salesforce.com Customization Handbook
Salesforce.com Customization Handbook
Overview of this book
Table of Contents (19 chapters)
Salesforce.com Customization Handbook
Credits
About the Authors
About the Reviewers
www.PacktPub.com
Preface
Free Chapter
Getting Started with Salesforce
User Management and Organization Administration
Making Your Salesforce Data Secure – Security Settings in Salesforce
Domain Management, E-mail Administration, and Google Apps Settings
CRM Functions and Streamlining Business Requirements
Automating a Business Process
Concepts of Data Management
Reports and Dashboards in Salesforce
Chatter Configuration
Mobile Administration
Setting Up Deployment Processes
AppExchange – Extending Salesforce Functionality
Index
Customer Reviews