Tracking history on reports Reporting on current values is cool, but sometimes, we need to know the trends of certain fields. As an example, it may be necessary for our call center to find out how the statuses of the cases change day by day or how the opportunity amount and stage vary from week…
Cybersecurity Threats, Vulnerabilities, and Attacks Summary-3
Rogue access points are installed on networks without authorization. They can masquerade as legitimate access points to trick users into associating with them. They can be used to conduct MitM attacks by deauthenticating users or posing as legitimate access points with more desirable connections in evil twin attacks. Wireless signals are susceptible to interference and…
Tracking history on reports 2 – Certified Advanced Salesforce Admin Exam Guide
You can create a simple report that shows open cases by using the following details: This is how it may appear: Open cases tabular report Now, create a new custom object with the following shape: Remember to set the field-level security for your user (you may run into problems when snapshots are collected if your…
Cybersecurity Threats, Vulnerabilities, and Attacks Summary-2
Shoulder surfing refers to looking over someone’s shoulder in order to obtain credentials like passwords, PINs, or credit card numbers. Dumpster diving means literally going through someone’s trash to find confidential personal information. Piggybacking and tailgating are ways to gain unauthorized physical access to restricted areas. Other means of deception are sending fake invoices to…
Subscribing to reports – Certified Advanced Salesforce Admin Exam Guide
Subscribing to reports In order to complete this chapter, we need to briefly mention report scheduling. We can set up a report so that it runs at a given time and apply a filter so that we receive notifications about it. To access this feature, click on the Subscribe (in Lightning Experience) action on the…
Cybersecurity Threats, Vulnerabilities, and Attacks Summary-1
Cybersecurity Threats, Vulnerabilities, and Attacks Summary (38.6) The following is a summary of each topic in the chapter and some questions for your reflection. What Did I Learn in This Chapter? (38.6.1) • Common Threats—A threat domain is an area of control, authority, or protection that attackers can exploit to gain access to a system….
Defending Against Email and Browser Attacks
Defending Against Email and Browser Attacks (38.5.12)There are many actions that you can take to defend against email and browser attacks. Some of the most important ones are outlined here: The following are some other common attacks that cybercriminals can launch. Physical AttacksPhysical attacks are intentional, offensive actions used to destroy, expose, alter, disable, steal,…
Visualizing Key Metrics with Dashboards
Visualizing Key Metrics with Dashboards In this chapter, we’ll dig into dashboards, a graphical representation of Salesforce reports: with Dashboards we can understand the changing business conditions and key metrics that are useful for us to know when making decisions, everything based on the real-time data gathered with Salesforce Reports. We’ll see how to create…
Setting up a dashboard – Certified Advanced Salesforce Admin Exam Guide
Setting up a dashboard Dashboards can be created in Lightning Experience and Salesforce Classic, but in this chapter we’ll be digging into Lightning Experience. For all the details on how to deal with Classic Dashboards, refer to the Salesforce Help at https://help.salesforce.com/articleView?id=dashboards_create.htm&type=5. Before creating a dashboard, make sure you have at least one source report…
Spam – 100-150 Exam Study Guide
Spam (38.5.8) Spam, also known as junk mail, is simply unsolicited email. In most cases, it is a method of advertising. However, a lot of spam is sent in bulk by computers infected by viruses or worms—and often contains malicious links, malware, or deceptive content that aims to trick recipients into disclosing sensitive information, such…