Exploring and customizing rules In this section, we will learn how to customize the duplicate and matching rules. Customizing duplicate rules As we have already seen in the previous sections, duplicate rules are used to alert on potential duplicates or prevent potential duplicates for a given record (if it is used on objects other than…
Antimalware Programs – 100-150 Exam Study Guide
Antimalware Programs (39.5.7) Malware includes viruses, worms, Trojan horses, keyloggers, spyware, and adware. These are designed to invade privacy, steal information, damage the computer, or corrupt data. It is important that you protect computers and mobile devices using reputable antimalware software. Table 39-6 summarizes the types of antimalware programs that are available. Table 39-6 Types…
Customizing matching rules – Certified Advanced Salesforce Admin Exam Guide
Customizing matching rules A matching rule defines how duplicate records are identified. We have predefined standard matching rules, but we can create new matching rules by going to Setup | Duplicate Management | Matching Rules and clicking on New Rule. Select the External Contact object. Let’s create a rule with the following configuration: Matching rule…
Packet Filtering Firewall Benefits and Limitations
Packet Filtering Firewall Benefits and Limitations (39.5.4) Packet filtering firewalls are usually part of a router firewall, which permits or denies traffic based on Layer 3 and Layer 4 information, as shown in Figure 39-16. They are stateless firewalls that use a simple policy table lookup that filters traffic based on specific criteria, as shown…
Considerations regarding duplicate management
Considerations regarding duplicate management We can have up to 5 active duplicate rules per object and up to 3 matching rules on each duplicate rule (and 1 matching rule per object). We can also have up to 5 matching rules (active or not) per object, a total of 25 matching rules (active) on all objects,…
Types of Firewalls – 100-150 Exam Study Guide
Types of Firewalls (39.5.2)It is important to understand the different types of firewalls and their specific capabilities so that the right firewall is used for each situation. Packet Filtering (Stateless) FirewallPacket filtering firewalls are usually part of a router firewall, which permits or denies traffic based on Layer 3 and Layer 4 information, as shown…
Salesforce CRM Content Management
Salesforce CRM Content Management In this chapter, we’ll analyze a way to handle data in a documented format, using the Salesforce CRM Content feature. We will learn how to use Salesforce CRM Content to organize, share, search, and manage all types of corporate files within our organization. We will also learn how to set up…
Network-Based Malware Protection
Network-Based Malware Protection (39.4.4) New security architectures for the borderless network address security challenges by having endpoints use network scanning elements. These devices provide many more layers of scanning than a single endpoint possibly could, as shown in Figure 39-10. Network-based malware prevention devices are also capable of sharing information among themselves to make better-informed…
Host-Based Malware Protection
Host-Based Malware Protection (39.4.3)The network perimeter is always expanding. People access corporate network resources with mobile devices that use remote-access technologies such as VPN. These same devices are also used on unsecured, or minimally secured, public and home networks. Host-based antimalware/antivirus software and host-based firewalls are used to protect these devices. Antivirus/Antimalware SoftwareThis is software…
Further Salesforce CRM Content options
Further Salesforce CRM Content options We can define multilanguage support in Setup | Salesforce CRM Content | Enable multilanguage search and contribute. With this option, a new Language picklist is shown when editing and searching for content in the Content page: The language search filter for multilanguage setup Moreover, libraries can be displayed on communities…