Summary

In this chapter, we have gone through various security setting features available on Salesforce. Starting from OWD, followed by Sharing Rules and Field-Level Security, we also covered password policy concepts and two-factor authentication in Salesforce. Finally, we discussed Audit Trails, remote site settings, and Portal Health Check-ups. Now, you should be able to understand and manage Salesforce.com's security settings to have an efficient form of data security, providing a balance between security of data access for users and limiting risk of misuse and loss of data. In the next chapter, we will go through the e-mail administration concepts, and we will also cover how to change your Salesforce login page as well as concepts related ...

Get Salesforce.com Customization Handbook now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.