Adding files to libraries Add a new file using the Add Files button in Lightning Experience. You can upload a new file to a given library’s folder/subfolder. After a file is created, you can view most of its metrics: File details on Lightning Experience There no such thing as tagging. Let’s switch back to Salesforce…
Antimalware Protection – 100-150 Exam Study Guide
Antimalware Protection (39.4) Malware, is short for “malicious software.” Malware is any type of software that is specifically designed to damage, disrupt, or gain unauthorized access to end devices or networks. The intent of malware is to steal sensitive information, compromise system functionality, or perform other harmful actions Endpoint Threats (39.4.1) The term “endpoint” is…
Content packs – Certified Advanced Salesforce Admin Exam Guide
Content packs A content pack is a collection of related content items that are stored as a group within Salesforce CRM Content (for example, product-related documents or generic company policies). Using the Create New… | Content Pack button on the library main page, we can create a new content pack (note that Adobe Flash is…
What Is Boot Integrity? – 100-150 Exam Study Guide
What Is Boot Integrity? Boot integrity ensures that the system can be trusted and has not been altered while the operating system loads. Firmware—software instructions about basic computer functions—is stored on a small memory chip on the motherboard. The basic input/output system (BIOS) is the first program that runs when you turn on the computer….
Mastering Reports – Certified Advanced Salesforce Admin Exam Guide
Mastering Reports Reports give you access to your Salesforce data and can be used as an important metric for your company’s business. With reporting, you can look at all the open cases and see which agent is taking longer to close a case (thereby understanding whether you need to share internal knowledge to make users…
Host Intrusion Detection Systems (HIDSs)
Host Intrusion Detection Systems (HIDSs) HIDS software is installed on a device or server to monitor suspicious activity. It monitors system calls and file system access to detect malicious requests. It can also monitor configuration information about the device that is held in the system registry. A HIDS stores all log data locally. It is…
Report types – Certified Advanced Salesforce Admin Exam Guide
Report types The Salesforce platform provides some predefined standard report types that involve diverse objects and conditions (which cannot be modified) and a huge list of custom prebuilt custom report types that are free to use. An exhaustive list of built-in report types can be found at https://help.salesforce.com/articleView?id=reports_report_type_reference.htm&type=5. To create a new report type, go…
Patch Management – 100-150 Exam Study Guide
Patch Management (39.3.4)Cybercriminals work relentlessly to exploit weakness in computer systems. To stay one step ahead, keep systems secure and up to date by regularly installing patches. What Are Patches?Patches are code updates that prevent a new virus, worm, or other malware from making a successful attack. Patches and upgrades are often combined into a…
Check Your Understanding—Access Control
Check Your Understanding—Access Control (39.2.12)Refer to the online course to complete this activity. Video—Configure Access Control (39.2.13)Refer to the online course to view this video. Packet Tracer—Configure Access Control (39.2.14)In the following Packet Tracer activity, you will complete the following objectives: Refer to the online course to complete this Packet Tracer. Defending Systems and Devices…
Multi-Factor Authentication
Multi-Factor Authentication (39.2.9) As we’ve touched upon earlier, multi-factor authentication uses at least two methods of verification—such as a password and something you have, for example, a security key fob. This can be taken a step further by adding something you are, such as a fingerprint scan. Multi-factor authentication can reduce the incidence of online…