• Zero to Hero

    Salesforce Security Part 2 – System Security

    Tweet Pin Share SharePREFACE: This post is part of the Zero to Hero series. While most Admins struggle with the concepts ...
Load More Related Articles
Load More By Brent Downey
Load More In Zero to Hero

8 Comments


  1. Carlos

    March 21, 2016 at 9:24 am

    Nice article.

    Reply

  2. Norm Copeland

    March 21, 2016 at 9:50 am

    A great refresher! Thanks Brent for taking the time to put this together.

    Reply

  3. Munira

    March 21, 2016 at 11:24 am

    TYPO

    Login IP Ranges are restrictive and prevents a user from logging in without verification (or at all). From a security perspective, users could be ****completed***** blocked from accessing Salesforce unless they are within a verified IP range.

    It should be completely

    Reply

  4. Munira

    March 21, 2016 at 11:37 am

    Between Salesforce Security Part I and Part II, I found Part I more helpful and informative.

    Reply

  5. Andy

    March 21, 2016 at 1:20 pm

    Nice article Brent. I believe in Spring ’16, some security feature was strengthened – my users seem to get asked to enter a security code more often than normal. Do you have any details on that?

    Reply

  6. eesha

    October 26, 2016 at 4:25 pm

    22. In a master-child relationship between a standard object and custom object
    which of the following statements is NOT true? Please select two (2) items.
    a. The standard object is always the master
    b. The custom object is always the master
    c. The custom object is always a child
    d. The standard or custom object can be a master
    e. The standard object is never a child

    I think it is a and b
    would appreciate some help on the same.

    Reply

Leave a Reply

Your email address will not be published. Required fields are marked *

Sponsors