Learn Configuration and Setup (SF Admin) with Interactive Flashcards

Master key concepts in Configuration and Setup through our interactive flashcard system. Click on each card to reveal detailed explanations and enhance your understanding.

Company Settings and Information

Company Settings and Information in Salesforce represents the foundational configuration that defines your organization's profile within the platform. As a Platform Administrator, understanding these settings is crucial for proper system setup and maintenance.

Company Information contains essential details about your Salesforce org, including the organization name, address, primary contact, default locale, language, and time zone. These settings establish the baseline for how data is displayed and formatted across the entire organization. Administrators access this section through Setup by searching for 'Company Information' in the Quick Find box.

Key elements within Company Information include:

**Organization Details**: Your company name, address, phone number, and the primary admin contact information. This information appears in various system-generated communications.

**Default Settings**: The default locale determines date, time, and number formats. The default language affects the user interface language for new users, while the default time zone impacts scheduled processes and timestamp displays.

**Licenses and Usage**: This section displays your current license allocations, including user licenses, feature licenses, and permission set licenses. Administrators can monitor usage to ensure compliance and plan for growth.

**Fiscal Year Settings**: Organizations can configure custom fiscal year definitions that differ from the calendar year, which is essential for accurate reporting and forecasting aligned with business operations.

**Currency Settings**: For organizations operating in multiple countries, currency management allows configuration of corporate currency and active currencies for transactions.

**Organization ID**: A unique 15 or 18-character identifier for your Salesforce instance, often needed when integrating with external systems or contacting Salesforce support.

Regularly reviewing Company Information ensures your org reflects current business requirements. Changes to these settings can have organization-wide impacts, so administrators should carefully consider modifications and communicate changes to stakeholders when necessary.

Fiscal Year Settings

Fiscal Year Settings in Salesforce allow administrators to customize how their organization tracks and reports financial data based on their specific business calendar rather than the standard January-December calendar year. This configuration is essential for accurate forecasting, reporting, and quota management.

Salesforce offers two types of fiscal year configurations:

**Standard Fiscal Year:** This option allows you to define a fiscal year that follows a consistent pattern with 12 months of equal duration. You can specify which month your fiscal year begins and whether the fiscal year is named for the starting or ending calendar year. For example, if your fiscal year starts in April, you can configure this setting accordingly.

**Custom Fiscal Year:** This option provides greater flexibility for organizations with non-standard fiscal periods. Custom fiscal years can accommodate varying week or month lengths, 4-4-5, 4-5-4, or 5-4-4 week patterns, and 13-period fiscal years. Once enabled, custom fiscal years cannot be disabled, so careful planning is required before implementation.

**Key Configuration Steps:**
1. Navigate to Setup and search for Fiscal Year
2. Select Standard or Custom Fiscal Year
3. Define the start month and naming convention
4. For custom years, define individual fiscal periods and quarters

**Important Considerations:**
- Fiscal year settings affect forecasting, opportunities, reports, and dashboards
- Changes to fiscal year settings impact historical data calculations
- Custom fiscal years require manual definition of each fiscal period annually
- Forecasts and quotas are organized according to your fiscal year structure

**Best Practices:**
- Align Salesforce fiscal settings with your companys actual financial calendar
- Test fiscal year changes in a sandbox environment first
- Document your fiscal year structure for future administrators
- Plan ahead for custom fiscal year period definitions

Proper fiscal year configuration ensures accurate sales forecasting and financial reporting across your Salesforce organization.

Business Hours and Holidays

Business Hours and Holidays are essential configuration features in Salesforce that help organizations define when they are available to serve customers and when they observe non-working periods. These settings directly impact case management, entitlements, and escalation rules.

Business Hours define the operational schedule of your organization, specifying the days and times when your support team is available. You can configure multiple business hour records to accommodate different time zones, departments, or service levels. Each business hour record includes the time zone setting and the specific hours for each day of the week. Business hours are crucial for calculating case age, response times, and service level agreements (SLAs). When escalation rules run, they respect business hours to ensure cases are escalated appropriately during working periods.

To set up Business Hours, navigate to Setup, search for Business Hours in the Quick Find box, and create new records specifying your operational schedule. You can designate one business hour record as the default, which applies to cases when no specific business hours are assigned.

Holidays represent days when your organization is closed and not providing service. Holiday records include the name, date, and optionally the time range if it's a partial day closure. Once created, holidays must be associated with specific business hour records to take effect. This association ensures that SLA calculations and escalation processes account for these non-working days.

To configure Holidays, access Setup, search for Holidays, and create holiday records. Then associate them with the appropriate business hour records by editing the business hours and adding the holidays to the holiday list.

These features work together to provide accurate time tracking for customer service metrics. Entitlement processes and milestones rely on business hours and holidays to calculate deadlines correctly, ensuring your team meets service commitments while accounting for actual working time.

Language and Locale Settings

Language and Locale Settings in Salesforce are fundamental configuration options that determine how users experience the platform based on their geographic and linguistic preferences. These settings ensure that Salesforce displays information in a format familiar to each user.

Language Settings control the text displayed throughout the Salesforce interface, including labels, buttons, help text, and system messages. Salesforce supports numerous languages, allowing organizations to deploy the platform globally. Administrators can set a default language at the organization level, while individual users can override this with their preferred language in personal settings.

Locale Settings determine how dates, times, numbers, and currency values are formatted. For example, a user in the United States would see dates as MM/DD/YYYY, while a user in the United Kingdom would see DD/MM/YYYY. This ensures data is presented in culturally appropriate formats.

Currency Settings work alongside locale to display monetary values correctly. Organizations can enable multiple currencies to support international operations, with a corporate currency serving as the standard for reporting.

Time Zone Settings ensure that date and time fields reflect the correct local time for each user. This is critical for scheduling, activity tracking, and collaboration across global teams.

Administrators configure these settings in Setup under Company Information for organization-wide defaults. The path is Setup > Company Settings > Company Information. Here you can set the Default Language, Default Locale, Default Time Zone, and Default Currency.

Users can personalize their experience through My Settings > Personal > Language and Time Zone. This flexibility allows individuals to work in their preferred format while maintaining organizational consistency.

Proper configuration of these settings is essential for user adoption, data accuracy, and compliance with regional requirements. Administrators should carefully consider their user base when establishing defaults and communicate available personalization options to end users.

Lightning Experience Interface

Lightning Experience is Salesforce's modern, intuitive user interface designed to enhance productivity and streamline workflows for administrators and end users. As a Salesforce Platform Administrator, understanding Lightning Experience is essential for effective configuration and setup.

Lightning Experience offers a component-based architecture that provides a more dynamic and responsive interface compared to Salesforce Classic. The interface features a streamlined navigation bar, customizable home pages, and enhanced dashboards that display real-time data visualizations.

Key features include the App Launcher, which provides quick access to all applications and items, and the Utility Bar, offering persistent access to commonly used tools like notes, history, and calculators. Kanban views allow users to visualize records in pipeline stages, while the Activity Timeline consolidates all related activities on a single record page.

Administrators can customize Lightning Experience through the Lightning App Builder, a drag-and-drop tool for creating custom pages using standard and custom components. Record pages can be tailored for different user profiles, apps, and record types, ensuring users see relevant information based on their roles.

The Setup menu in Lightning Experience provides a reorganized, searchable interface for administrative tasks. Object Manager centralizes object-related configurations, making it easier to manage fields, page layouts, validation rules, and relationships.

Lightning Experience supports both desktop and mobile experiences through responsive design. Administrators can enable Lightning Experience for specific user profiles using the Lightning Experience Transition Assistant, which helps assess readiness and guides the migration process.

Additional configuration options include compact layouts for highlighting key fields, path settings for guiding users through business processes, and Lightning pages that combine multiple components for enhanced functionality.

Understanding these capabilities enables administrators to optimize the user experience, improve adoption rates, and leverage Salesforce's full potential for organizational success.

Switching Between Lightning and Classic

Switching between Lightning Experience and Salesforce Classic is an essential skill for Salesforce Platform Administrators to understand, as organizations often need to support users who prefer different interfaces or require access to features available in one interface but not the other.

Lightning Experience is Salesforce's modern, component-based user interface that offers enhanced productivity features, improved navigation, and a more intuitive design. Salesforce Classic is the original interface that some users and organizations continue to utilize for various reasons.

To switch from Lightning Experience to Salesforce Classic, users can click on their profile picture or avatar in the upper right corner of the screen. From the dropdown menu, they will see an option labeled 'Switch to Salesforce Classic.' Clicking this option transitions the user to the Classic interface.

To switch from Salesforce Classic back to Lightning Experience, users should click their name in the upper right corner and select 'Switch to Lightning Experience' from the dropdown menu.

Administrators control whether users can switch between interfaces through several settings. In Setup, under Lightning Experience Transition Assistant, admins can manage the rollout strategy. The 'Let users switch between Lightning Experience and Salesforce Classic' option determines if users have switching capabilities.

Administrators can also assign Lightning Experience to specific users through permission sets or profiles. The 'Lightning Experience User' permission must be enabled for users to access the Lightning interface.

It is important to note that some features and customizations may only be available in one interface. Administrators should evaluate which features their organization requires and ensure users understand the differences between both interfaces.

Best practices suggest gradually transitioning users to Lightning Experience while maintaining Classic access during the adjustment period. This approach allows users to become comfortable with the new interface while still having access to familiar functionality when needed.

Home Page Customization

Home Page Customization in Salesforce allows administrators to create personalized and efficient landing pages for users, enhancing productivity and user experience. The home page serves as the first screen users see after logging in, making its customization crucial for effective platform adoption.

In Salesforce Lightning Experience, administrators can customize home pages using the Lightning App Builder, a drag-and-drop tool that enables the creation of dynamic, component-based layouts. Standard components include Recent Items, Assistant, Today's Events, Today's Tasks, and various dashboard charts. Custom components can also be added to display organization-specific information.

Administrators can create multiple home page variations and assign them based on different criteria. Using Lightning App Builder, you can design unique home pages for different apps within your organization. Additionally, home pages can be assigned to specific user profiles, ensuring that sales representatives see different content than service agents or executives.

Key customization features include:

1. Component Selection: Choose from standard Salesforce components or custom Lightning components to display relevant data and functionality.

2. Layout Configuration: Arrange components in single or multiple column layouts to optimize information presentation.

3. App-Specific Pages: Create distinct home pages for different Lightning apps to provide contextual experiences.

4. Profile-Based Assignment: Assign different home page layouts to various user profiles based on their roles and responsibilities.

5. Dashboard Integration: Embed dashboard components to provide at-a-glance metrics and KPIs.

To activate a custom home page, administrators must first save the page in Lightning App Builder, then activate it by assigning it as the org default or to specific apps and profiles. The activation process includes options for setting page visibility and determining which users will see the customized layout.

Proper home page customization drives user adoption by presenting relevant information upfront, reducing clicks needed to access critical data, and creating a tailored experience that matches each user's workflow requirements.

App Menu Configuration

App Menu Configuration in Salesforce is a crucial administrative function that allows Platform Administrators to control which applications are visible and accessible to users within their organization. This feature is found under Setup by navigating to App Menu settings.

The App Menu, commonly known as the App Launcher, serves as the central hub where users can access all available applications in their Salesforce environment. As an administrator, you have the ability to customize this menu to enhance user experience and maintain organizational efficiency.

Key aspects of App Menu Configuration include:

1. **Visibility Control**: Administrators can determine which apps appear in the App Launcher for all users. Apps can be marked as visible or hidden based on organizational requirements.

2. **App Organization**: You can arrange the order of applications, placing frequently used apps at the top for easier access. This helps users find their most important tools quickly.

3. **Connected Apps Management**: Third-party applications integrated through Connected Apps can also be managed here, controlling their visibility within the App Launcher.

4. **Default App Selection**: Administrators can set default applications that users see when they first log in, streamlining their workflow.

5. **Tile Display**: The App Menu displays applications as tiles with icons, making navigation intuitive and visually organized.

To configure the App Menu, navigate to Setup, enter App Menu in the Quick Find box, and select App Menu. From there, you can drag and drop apps to reorder them or adjust their visibility settings.

It is important to note that profile and permission set settings work in conjunction with App Menu Configuration. Users will only see apps they have permission to access, even if those apps are visible in the menu configuration. This layered approach ensures proper security while maintaining a clean user interface tailored to each users role within the organization.

User Creation and Management

User Creation and Management is a fundamental aspect of Salesforce administration that involves creating, configuring, and maintaining user accounts within your Salesforce organization. As a Platform Administrator, understanding this process is essential for ensuring proper system access and security.

To create a new user, navigate to Setup > Users > Users > New User. Required fields include Username (must be unique across all Salesforce organizations and formatted like an email), Email, Last Name, Alias, Nickname, Role, Profile, and User License. The username serves as the login credential, while the email address receives login information and notifications.

Profiles are critical components that determine baseline permissions, controlling what users can see and do within Salesforce. Each user must be assigned exactly one profile, which defines object permissions, field-level security, app access, and system permissions.

User Licenses determine which features and functionality users can access. Common license types include Salesforce (full CRM access), Salesforce Platform (custom app access), and Chatter licenses for collaboration features.

Roles establish the record visibility hierarchy, determining which records users can view based on the organization's reporting structure. Roles work with sharing settings to extend access beyond ownership.

Key management tasks include resetting passwords, freezing or deactivating users, unlocking accounts after failed login attempts, and modifying user details. Deactivating users is preferred over deleting them to maintain data integrity and audit trails.

Administrators can also manage users through features like delegated administration, allowing designated users to perform specific administrative tasks for defined groups. Permission Sets provide additional permissions beyond the profile, offering flexibility in granting access.

Best practices include regularly auditing user accounts, promptly deactivating departed employees, using descriptive usernames, and documenting your user management processes. Proper user management ensures security compliance and optimal system performance while providing appropriate access levels for all organizational members.

User License Types

User License Types in Salesforce determine the baseline functionality and access that users can have within the Salesforce platform. Understanding these license types is essential for Platform Administrators when configuring user access and managing organizational resources effectively.

Salesforce offers several primary license types:

**Salesforce License**: This is the full CRM license providing complete access to standard Salesforce functionality including Sales Cloud and Service Cloud features. Users can access custom apps, standard objects, and most platform capabilities.

**Salesforce Platform License**: This license allows users to access custom applications built on the Salesforce platform but restricts access to standard CRM objects like Opportunities and Cases. It is ideal for users who need custom app access rather than traditional CRM functionality.

**Lightning Platform Starter and Plus**: These licenses provide varying levels of access to custom applications with different object and feature limitations. They are cost-effective options for users requiring limited platform interaction.

**Chatter Licenses**: Chatter Free and Chatter External licenses enable collaboration features. Chatter Free allows internal users to access Chatter functionality, while Chatter External is designed for customers or partners needing portal access.

**Community Licenses**: These include Customer Community, Customer Community Plus, and Partner Community licenses, enabling external users to interact through Experience Cloud sites with varying capability levels.

**Identity License**: This provides single sign-on and identity services functionality for users who need authentication capabilities.

Administrators assign user licenses when creating user records, and each license type determines which permission sets and profiles can be associated with users. The organization's contract specifies the number of each license type available.

Proper license management ensures cost optimization while providing users appropriate access levels. Administrators should regularly audit license usage through Setup menus and reports to ensure compliance with contractual limits and to identify opportunities for reallocation based on actual user needs and organizational requirements.

Profiles and Their Purposes

Profiles in Salesforce are fundamental components that define what users can do within the platform. They serve as the primary mechanism for controlling user permissions and access at the most basic level.

A profile determines several critical aspects of user experience and capabilities:

**Object Permissions**: Profiles control CRUD (Create, Read, Update, Delete) access to standard and custom objects. Administrators can specify which objects users can view, modify, or manage based on their assigned profile.

**Field-Level Security**: Beyond object access, profiles determine which fields within objects are visible or editable. This granular control ensures sensitive data remains protected from unauthorized viewing or modification.

**App and Tab Settings**: Profiles govern which applications and tabs users can access. Administrators can make certain apps default or visible, and control tab visibility settings.

**Page Layout Assignments**: Different profiles can be assigned different page layouts for the same object, allowing customized user experiences based on roles.

**Record Type Access**: Profiles determine which record types are available to users and which record type serves as the default when creating new records.

**Login Hours and IP Restrictions**: Security settings within profiles can restrict when and from where users can log in to Salesforce.

**System Permissions**: Administrative capabilities like "Modify All Data" or "View Setup and Configuration" are controlled through profile settings.

Salesforce provides two types of profiles: Standard Profiles (pre-built and cannot be deleted, with limited customization) and Custom Profiles (created by administrators with full customization options).

Every user must be assigned exactly one profile, making it mandatory for user creation. Best practice recommends using profiles for baseline permissions and supplementing them with Permission Sets for additional access needs. This approach provides flexibility while maintaining security standards.

Profiles work alongside other security features like Role Hierarchy, Sharing Rules, and Permission Sets to create a comprehensive security model.

Permission Sets

Permission Sets in Salesforce are powerful tools that extend user access beyond what their profile provides. While profiles define the baseline permissions for users, Permission Sets allow administrators to grant additional permissions without changing a user's profile or creating multiple profiles for slight variations in access needs.

A Permission Set is a collection of settings and permissions that give users access to various tools and functions. These can include object permissions, field permissions, app permissions, tab settings, apex class access, Visualforce page access, and system permissions. Unlike profiles, which are assigned on a one-to-one basis, multiple Permission Sets can be assigned to a single user.

Key benefits of Permission Sets include:

1. Flexibility: Administrators can create modular sets of permissions that can be combined in different ways to meet diverse user requirements.

2. Simplified Administration: Instead of maintaining numerous profiles with slight differences, you can maintain fewer profiles and use Permission Sets to handle exceptions.

3. Scalability: As organizational needs grow, new Permission Sets can be created and assigned to relevant users easily.

4. License Management: Permission Sets can be associated with specific licenses, ensuring users only receive permissions appropriate to their license type.

Permission Set Groups, introduced as an enhancement, allow administrators to bundle multiple Permission Sets together for easier assignment. This feature includes muting permissions, which lets you suppress specific permissions within a group when needed.

When configuring Permission Sets, administrators should follow the principle of least privilege, granting only the minimum permissions necessary for users to perform their job functions. This approach enhances security while maintaining productivity.

Permission Sets are created through Setup by navigating to Permission Sets under Users. From there, administrators can define object settings, app permissions, system permissions, and various access controls. Once created, Permission Sets can be assigned to users individually or through Permission Set Groups for bulk assignment.

Permission Set Groups

Permission Set Groups are a powerful feature in Salesforce that allow administrators to bundle multiple permission sets together into a single, manageable unit. This functionality streamlines the process of assigning permissions to users by grouping related permission sets that are commonly assigned together.

When configuring user access in Salesforce, administrators often need to assign several permission sets to achieve the desired level of access. Permission Set Groups simplify this by combining these individual permission sets into one assignable group. For example, if a sales representative needs access to specific objects, reports, and custom applications, an administrator can create a Permission Set Group containing all relevant permission sets and assign it in one action.

A key component of Permission Set Groups is the Muting Permission Set. This feature allows administrators to suppress or mute specific permissions within the group. If a permission set in the group grants a particular permission that should not apply to certain users, the muting permission set can revoke that access at the group level. This provides granular control over access management.

Permission Set Groups offer several benefits for Salesforce administrators. They reduce complexity by minimizing the number of individual assignments needed per user. They improve maintainability since changes to a permission set automatically apply to all users assigned to the group. They also enhance scalability, making it easier to manage permissions as organizations grow.

To create a Permission Set Group, navigate to Setup, search for Permission Set Groups, and click New. Add the desired permission sets to the group and optionally configure a muting permission set. Once created, the group can be assigned to users through their user record or via assignment rules.

Permission Set Groups work alongside profiles and individual permission sets in Salesforce security model, providing administrators with flexible tools to implement the principle of least privilege while maintaining efficient access management across the organization.

Role Hierarchy

Role Hierarchy in Salesforce is a fundamental security and data access feature that controls record visibility based on an organization's reporting structure. It determines which users can view and edit records owned by other users within the system.

The Role Hierarchy works on the principle that users higher in the hierarchy automatically gain access to records owned by users below them. This creates a pyramid-like structure where managers can see their subordinates' data, but subordinates cannot see their managers' records by default.

Key characteristics of Role Hierarchy include:

1. **Vertical Access Model**: Access flows upward through the hierarchy. A Vice President of Sales can view all records owned by Sales Managers, who in turn can view records owned by Sales Representatives beneath them.

2. **Organization-Wide Defaults (OWD) Relationship**: Role Hierarchy extends access beyond OWD settings. If OWD is set to Private for an object, users can still access records owned by subordinates through their role position.

3. **Grant Access Using Hierarchies**: This setting can be enabled or disabled per object for custom objects, allowing administrators to control whether the hierarchy should extend access for specific data.

4. **Role Assignment**: Each user is assigned exactly one role, though not all users require a role assignment. Roles can be created to mirror the company's organizational chart.

5. **Reporting and Forecasting**: Role Hierarchy also impacts sales forecasting and reporting, as it determines how data rolls up through management levels.

Administrators configure Role Hierarchy by navigating to Setup > Users > Roles. Best practices include keeping the hierarchy simple, aligning it with actual business reporting structures, and considering data access requirements when designing roles.

Role Hierarchy complements other sharing mechanisms like Sharing Rules, Manual Sharing, and Teams to create a comprehensive data access model that balances security with appropriate visibility across the organization.

Public Groups

Public Groups in Salesforce are collections of individual users, roles, territories, and other groups that can be used to simplify sharing rules and data access management. As a Platform Administrator, understanding Public Groups is essential for effective security configuration.

Public Groups serve as reusable containers that allow administrators to grant data access to multiple users simultaneously rather than configuring permissions individually. This significantly reduces administrative overhead and ensures consistent access policies across the organization.

Key characteristics of Public Groups include:

1. **Membership Flexibility**: Groups can contain individual users, roles, roles and subordinates, other public groups, and territories. This nested capability allows for complex access hierarchies.

2. **Use Cases**: Public Groups are commonly used in sharing rules, manual sharing, email alerts, assignment rules, and report folder access. They provide a centralized way to manage who can view or edit specific records.

3. **Creation and Management**: Administrators create Public Groups through Setup by navigating to Users > Public Groups. When creating a group, you specify the group label, name, and member types.

4. **Grant Access Using Hierarchies**: This checkbox determines whether users higher in the role hierarchy can access records shared with the group. When enabled, managers automatically gain access to records shared with their subordinates through the group.

5. **Best Practices**: Name groups descriptively based on their purpose rather than current members. This makes maintenance easier as organizational changes occur. Groups should be designed around job functions or data access needs.

6. **Sharing Rules Integration**: Public Groups work alongside sharing rules to extend record access beyond ownership and role hierarchy. Administrators can create criteria-based or owner-based sharing rules that reference these groups.

Public Groups provide administrators with powerful tools to implement the principle of least privilege while maintaining operational efficiency in managing data access across the Salesforce organization.

Queues

Queues in Salesforce are a powerful feature within Configuration and Setup that allow organizations to manage and distribute records among team members efficiently. They function as holding areas for records that need to be processed by a group of users rather than a single individual.

Queues can be created for various objects including Cases, Leads, Orders, Custom Objects, and Service Contracts. When records are assigned to a queue, any member of that queue can take ownership of the record and begin working on it. This promotes workload distribution and ensures no single person becomes a bottleneck.

To create a queue, administrators navigate to Setup, then search for Queues in the Quick Find box. From there, they can define the queue name, specify which objects the queue will support, and add queue members. Members can include individual users, roles, roles and subordinates, public groups, or partner users.

Key benefits of using queues include improved team collaboration, balanced workload distribution, and better tracking of pending work items. Queue members receive email notifications when new records are added, helping ensure timely responses.

Queues integrate seamlessly with assignment rules and escalation rules. For example, Case Assignment Rules can route incoming cases to specific queues based on criteria like case origin, priority, or customer type. Similarly, Lead Assignment Rules can distribute leads to appropriate sales team queues.

List views can be configured to display records owned by a queue, making it easy for team members to see available work. Users can accept records from the queue by changing the owner from the queue to themselves.

Administrators should consider queue membership carefully, ensuring the right users have access while maintaining security. Queues also appear in reports and dashboards, providing visibility into queue performance and helping managers identify bottlenecks or capacity issues within their teams.

Delegated Administration

Delegated Administration in Salesforce is a powerful feature that allows administrators to assign specific administrative privileges to non-admin users, enabling them to perform certain tasks on behalf of the primary system administrator. This capability helps distribute the administrative workload across an organization while maintaining security and control.

A Delegated Administrator can be granted permissions to manage users within specified roles and subordinate roles, create and edit users, reset passwords, assign permission sets, and manage public groups. This is particularly useful in large organizations where a single administrator cannot efficiently handle all user management tasks.

To set up Delegated Administration, the system administrator creates a Delegated Administration group from Setup by navigating to Security Controls and then selecting Delegated Administration. Within this group, administrators define which users will serve as delegated administrators and specify the scope of their authority.

Key configuration options include:

1. User Administration - Define which roles the delegated admin can manage, allowing them to create and modify users only within those role hierarchies.

2. Custom Object Administration - Grant permissions to manage specific custom objects, including creating, editing, and deleting records.

3. Permission Set Assignment - Allow delegated admins to assign specific permission sets to users they manage.

4. Profile Assignment - Specify which profiles the delegated admin can assign to new or existing users.

Delegated Administration differs from granting full administrative access because it provides granular control over what actions can be performed and on which subset of users or data. This follows the principle of least privilege, ensuring users have only the access necessary to perform their designated tasks.

Best practices include regularly reviewing delegated administration groups, documenting the scope of each delegation, and auditing changes made by delegated administrators to maintain organizational security and compliance requirements.

Login History and Access

Login History and Access are essential security and monitoring features within Salesforce that help administrators track and manage user authentication activities.

Login History provides a comprehensive record of all login attempts made to your Salesforce organization. Administrators can access this feature by navigating to Setup and searching for 'Login History.' This log captures critical information including the username, login time, source IP address, login type (such as Application, API, or Partner Product), browser type, platform, and whether the attempt was successful or failed.

The Login History data is retained for six months and can be downloaded as a CSV file for further analysis or compliance requirements. This feature is invaluable for security auditing, troubleshooting user access issues, and identifying suspicious activities such as unauthorized login attempts or unusual login patterns from unexpected locations.

Administrators can also view login history at the individual user level by accessing the user record and scrolling to the Login History related list. This provides a focused view of a specific user's authentication activities.

Access management in Salesforce encompasses several components that control how users interact with the system. Session Settings allow administrators to configure session timeout values, login IP ranges at the organization level, and login hours restrictions. These settings help enforce security policies and limit access based on time and location parameters.

Network Access settings enable administrators to define trusted IP ranges, ensuring users can only access Salesforce from approved network locations. When combined with profile-level login IP restrictions and login hour limitations, organizations can create robust access control frameworks.

The Identity Verification History tracks multi-factor authentication events, providing additional visibility into security verification activities. Together, Login History and Access controls form a comprehensive approach to maintaining security, ensuring compliance, and protecting sensitive organizational data within the Salesforce platform.

Password Policies

Password Policies in Salesforce are essential security configurations that administrators use to protect organizational data and ensure user authentication meets company standards. These policies define the rules and requirements for user passwords across the Salesforce org.

Key components of Password Policies include:

**Password Requirements:**
- Minimum password length (typically 8-128 characters)
- Password complexity requirements (uppercase, lowercase, numbers, special characters)
- Password history enforcement to prevent reusing recent passwords
- Password expiration periods (30, 60, 90 days, or never expires)

**Login Attempts and Lockout:**
- Maximum invalid login attempts before account lockout (3, 5, 10, or no limit)
- Lockout effective period (15 minutes to forever)
- These settings help prevent brute force attacks

**Password Question Requirements:**
- Administrators can require security questions for password resets
- This adds an additional verification layer

**Session Settings:**
- Session timeout values determine how long users remain logged in during inactivity
- Force logout on session timeout options

**Configuration Location:**
Administrators configure password policies by navigating to Setup > Security > Password Policies. Settings can be applied org-wide or through profiles for specific user groups.

**Profile-Level Overrides:**
Organizations can create different password policies for various user profiles, allowing stricter requirements for users with elevated access while maintaining standard policies for general users.

**Best Practices:**
- Implement strong password complexity requirements
- Set reasonable expiration periods
- Enable login attempt limits
- Require password history to prevent cycling
- Consider two-factor authentication as an additional security measure

Password policies are fundamental to Salesforce security administration and help organizations maintain compliance with industry regulations while protecting sensitive customer and business data from unauthorized access.

Session Settings

Session Settings in Salesforce are critical security configurations that administrators use to control user session behavior and protect organizational data. These settings are found under Setup > Security > Session Settings and provide granular control over how users interact with the platform.

Key session settings include:

**Session Timeout**: Administrators can configure how long a user session remains active before automatic logout. Options range from 15 minutes to 24 hours, helping balance security with user convenience. Shorter timeouts enhance security but may impact productivity.

**Login IP Ranges**: While typically set at the profile level, session settings work in conjunction with IP restrictions to ensure users access Salesforce from approved network locations only.

**Session Security Levels**: Salesforce distinguishes between Standard and High Assurance sessions. High Assurance sessions require stronger authentication methods like two-factor authentication and can be required for accessing sensitive data or connected applications.

**Clickjack Protection**: This setting prevents malicious websites from embedding Salesforce pages in frames, protecting users from potential attacks where they might unknowingly perform actions.

**Cross-Site Request Forgery (CSRF) Protection**: Enabled by default, this prevents unauthorized commands from being transmitted from users that the application trusts.

**Content Security Policy (CSP)**: Helps prevent cross-site scripting attacks by controlling which resources can be loaded.

**Lock Sessions to IP Address**: When enabled, if a users IP address changes during a session, they must log in again, preventing session hijacking.

**Force Logout on Session Timeout**: Determines whether users are logged out when their session expires or can continue with re-authentication.

**SMS Identity Confirmation**: Controls whether SMS can be used for identity verification.

Administrators must carefully balance security requirements with user experience when configuring these settings. Regular review of session settings ensures compliance with organizational security policies and industry regulations.

Object-Level Security

Object-Level Security in Salesforce is a fundamental component of the platform's security model that controls which objects users can access within your organization. As a Platform Administrator, understanding this concept is essential for properly configuring data access and maintaining security compliance.

Object-Level Security determines whether users can view, create, edit, or delete records for specific objects. This security layer is primarily managed through two mechanisms: Profiles and Permission Sets.

Profiles serve as the foundation for object-level permissions. Every user must have exactly one profile assigned, which defines their baseline access to objects. Within a profile, administrators can configure permissions such as Read, Create, Edit, Delete, View All, and Modify All for each standard and custom object. These permissions cascade from most restrictive to least restrictive.

Permission Sets provide additional flexibility by allowing administrators to grant extra permissions beyond what the profile provides. Unlike profiles, users can have multiple permission sets assigned, making it easier to manage access for users who need varying levels of object access based on their roles or responsibilities.

The View All and Modify All permissions are particularly powerful as they grant access to all records of an object regardless of sharing settings. View All allows users to see all records, while Modify All enables viewing, editing, deleting, and transferring all records.

When configuring Object-Level Security, administrators should follow the principle of least privilege, granting users only the minimum access required to perform their job functions. This approach reduces security risks and ensures data integrity.

Object-Level Security works in conjunction with Field-Level Security and Record-Level Security to create a comprehensive security framework. While object-level controls determine if users can access an object at all, field-level security restricts access to specific fields, and record-level security controls which individual records users can see.

Field-Level Security

Field-Level Security (FLS) is a critical component of Salesforce's security model that controls user access to view, edit, or delete specific fields on objects. As a Platform Administrator, understanding FLS is essential for maintaining data security and ensuring users only see information relevant to their roles.

FLS operates at the profile and permission set level, allowing administrators to define which fields are visible and editable for different user groups. There are two primary settings for each field: Visible and Read-Only. When Visible is checked, users can see the field. When Read-Only is also enabled, users can view but cannot modify the field value.

Administrators can configure FLS through several methods. The most common approach is through Setup by navigating to Object Manager, selecting the desired object, clicking on Fields & Relationships, choosing the specific field, and then clicking Set Field-Level Security. This displays a matrix showing all profiles with checkboxes for visibility and read-only permissions.

Alternatively, FLS can be managed through Profiles or Permission Sets. When editing a profile, navigate to Field-Level Security section to modify access for multiple fields simultaneously. Permission Sets offer more granular control and are recommended for extending field access beyond base profile settings.

Best practices for FLS include starting with minimal access and granting additional permissions as needed, regularly auditing field accessibility, using permission sets for flexibility, and documenting security requirements. Remember that FLS works in conjunction with object-level security - users need both object access and field-level access to interact with data.

FLS affects not only page layouts but also reports, list views, search results, and API access. Fields hidden through FLS will not appear in these contexts, providing comprehensive data protection across the entire platform. Understanding and properly configuring FLS is fundamental to maintaining a secure Salesforce environment.

Record-Level Security

Record-Level Security in Salesforce is a fundamental component of the platform's security model that controls which individual records users can view and edit after they have object-level access. While object-level security determines what types of data users can access, record-level security provides granular control over specific records within those objects.

There are four main mechanisms that govern record-level security:

1. Organization-Wide Defaults (OWD): These settings establish the baseline level of access for all records of each object. Options include Private, Public Read Only, Public Read/Write, and Controlled by Parent. Private is the most restrictive, limiting record access to only the record owner and users above them in the role hierarchy.

2. Role Hierarchy: This structure allows users higher in the hierarchy to access records owned by users below them. Managers can view and edit records owned by their subordinates based on their position in the hierarchy.

3. Sharing Rules: These extend access beyond what OWD provides. Criteria-based sharing rules grant access based on field values, while ownership-based sharing rules grant access based on record ownership. Sharing rules can open up access but cannot restrict it below OWD settings.

4. Manual Sharing: Record owners and administrators can manually share individual records with specific users or groups when needed for exceptional circumstances.

Additional features include Apex Managed Sharing for programmatic sharing, Teams for collaborative record access, and Territory Management for sales-focused sharing scenarios.

Best practices include starting with the most restrictive OWD settings and then opening access as needed through sharing rules and role hierarchy. Administrators should regularly audit sharing settings to ensure data security compliance. Understanding record-level security is essential for Platform Administrators to properly configure data access and maintain appropriate security boundaries within their Salesforce organization.

Organization-Wide Defaults (OWD)

Organization-Wide Defaults (OWD) represent the baseline level of access that users have to records they do not own in Salesforce. As the foundation of the sharing model, OWD settings establish the most restrictive access level for each object, which can then be opened up through other sharing mechanisms like sharing rules, manual sharing, or role hierarchies.<br><br>There are four primary OWD settings available: Private, Public Read Only, Public Read/Write, and Controlled by Parent. With Private settings, only the record owner and users above them in the role hierarchy can view and edit records. Public Read Only allows all users to view records but restricts editing to owners and those higher in the hierarchy. Public Read/Write grants all users the ability to view and edit all records for that object. Controlled by Parent is used for detail objects in master-detail relationships, where access is determined by the parent record's sharing settings.<br><br>Administrators configure OWD through Setup by navigating to Security Controls and selecting Sharing Settings. When modifying these settings, Salesforce may need to recalculate sharing rules, which can take time depending on data volume.<br><br>Best practices suggest setting OWD to the most restrictive level required by any user group, then using sharing rules and role hierarchies to extend access where needed. This approach follows the principle of least privilege, ensuring data security while maintaining appropriate accessibility.<br><br>OWD settings apply to standard and custom objects differently. Some standard objects like Solutions and Ideas have unique default options. Understanding how OWD interacts with profiles, permission sets, and the role hierarchy is essential for administrators designing secure yet functional data access models.<br><br>Proper OWD configuration ensures compliance with organizational security policies while enabling efficient collaboration across teams and departments within the Salesforce environment.

Sharing Rules

Sharing Rules in Salesforce are declarative tools that allow administrators to extend access to records beyond what is defined by the Organization-Wide Defaults (OWD). When OWD settings are restrictive (Private or Public Read Only), Sharing Rules provide a mechanism to grant additional access to specific groups of users based on record ownership or field criteria.

There are two primary types of Sharing Rules:

1. **Owner-Based Sharing Rules**: These rules share records owned by members of a specific public group, role, or role and subordinates with another group. For example, you can share all Opportunities owned by the Sales Team role with the Marketing Team role.

2. **Criteria-Based Sharing Rules**: These rules share records that match specific field values. For instance, you might share all Accounts where the Industry field equals 'Healthcare' with a particular public group.

Sharing Rules can grant two levels of access:
- **Read Only**: Users can view records but cannot edit them
- **Read/Write**: Users can both view and modify the shared records

Key considerations when implementing Sharing Rules include:

- Sharing Rules can only open up access; they cannot restrict access below OWD settings
- They apply to existing and future records that meet the criteria
- Changes to Sharing Rules may require recalculation of sharing, which can take time for large data volumes
- Sharing Rules are evaluated when records are created or modified

Sharing Rules work alongside other sharing mechanisms including Role Hierarchy, Manual Sharing, Apex Managed Sharing, and Team Sharing to create a comprehensive record access model.

Best practices include using public groups as the target for Sharing Rules rather than individual roles, as this provides more flexibility and easier maintenance. Additionally, administrators should regularly audit Sharing Rules to ensure they align with current business requirements and security policies.

Manual Sharing

Manual Sharing in Salesforce is a feature that allows record owners and administrators to grant access to specific records on a case-by-case basis, extending beyond the organization's default sharing settings and role hierarchy. This functionality provides flexibility when users need access to records they wouldn't normally see based on their role or the organization-wide defaults (OWD).

When OWD settings are set to Private or Public Read Only, manual sharing becomes particularly useful. Record owners can share their records with individual users, public groups, roles, or roles and subordinates. The sharing access levels available include Read Only and Read/Write, depending on organizational needs.

To implement manual sharing, users navigate to the record they own and click the Sharing button. From there, they can add users or groups and specify the access level. This creates a sharing rule that persists until the record owner removes it, the record ownership changes, or an administrator deletes the sharing entry.

Key characteristics of manual sharing include:

1. Only record owners, users higher in the role hierarchy, and administrators can manually share records.

2. Manual shares are automatically deleted when record ownership transfers to another user.

3. The feature works with standard and custom objects that have OWD set to Private or Public Read Only.

4. Manual sharing cannot restrict access below what is already granted through OWD, role hierarchy, or sharing rules.

5. Administrators can view and manage all manual shares through the Sharing button on records or via reports.

Manual sharing complements other sharing mechanisms like sharing rules, role hierarchy, and teams. It serves as a solution for exceptional access requirements that don't fit into broader sharing rule patterns. For optimal security practices, organizations should use manual sharing sparingly and prefer systematic sharing rules when access patterns are predictable and consistent across multiple records.

Criteria-Based Sharing Rules

Criteria-Based Sharing Rules in Salesforce are powerful tools that allow administrators to automatically extend record access to users based on specific field values within records. Unlike Owner-Based Sharing Rules, which share records based on who owns them, Criteria-Based Sharing Rules evaluate record data against defined conditions to determine sharing.

When configuring these rules, administrators select an object and define criteria using field comparisons. For example, you might create a rule that shares all Account records where the Industry field equals 'Healthcare' with a specific public group or role. The criteria can include up to 25 filter conditions using AND/OR logic for complex requirements.

To create a Criteria-Based Sharing Rule, navigate to Setup, search for Sharing Settings, and select the desired object. Click 'New' under the sharing rules section and choose 'Based on criteria' as the rule type. You then specify which records to share by setting field conditions, select the users or groups to share with, and define the access level (Read Only or Read/Write).

Key considerations include: these rules only grant additional access and cannot restrict existing permissions. They work within the organization's sharing hierarchy and respect the Organization-Wide Defaults (OWD). The rules are evaluated automatically when records are created or modified, ensuring access is always current.

Criteria-Based Sharing Rules are particularly useful for scenarios such as sharing opportunity records above a certain value with executives, granting access to cases with high priority to specialized support teams, or sharing accounts in specific regions with regional managers.

Administrators should note that while these rules provide flexibility, they consume system resources during recalculation. Large organizations should plan sharing rule implementations carefully to maintain performance. These rules complement other sharing mechanisms like manual sharing, role hierarchy, and teams to create a comprehensive security model.

Login IP Ranges

Login IP Ranges is a security feature in Salesforce that allows administrators to restrict user access based on IP addresses. This functionality is configured at the profile level and determines from which IP addresses users assigned to that profile can log into Salesforce.

When Login IP Ranges are configured for a profile, users associated with that profile can only access Salesforce from IP addresses that fall within the specified ranges. If a user attempts to log in from an IP address outside the defined ranges, they will be denied access to the system.

Key aspects of Login IP Ranges include:

1. **Profile-Level Configuration**: Each profile can have its own set of IP ranges, allowing granular control over different user groups. Navigate to Setup > Profiles > select a profile > Login IP Ranges section to configure.

2. **Multiple Ranges**: Administrators can define multiple IP ranges for a single profile, accommodating users who access from different office locations or networks.

3. **Format**: IP ranges are specified using start and end IP addresses in IPv4 format (e.g., 192.168.1.1 to 192.168.1.255).

4. **Identity Verification**: When no Login IP Ranges are set, users logging in from unrecognized locations may need to verify their identity through email or SMS. However, when ranges are configured and users access from within those ranges, identity verification may be bypassed.

5. **API Access**: Login IP Ranges also apply to API connections, ensuring programmatic access follows the same restrictions.

6. **Trusted IP Ranges**: Organization-wide Trusted IP Ranges (found in Network Access settings) work alongside profile-level restrictions but serve a different purpose - they primarily affect identity confirmation rather than blocking access entirely.

This feature is essential for organizations requiring strict security compliance, ensuring that Salesforce access occurs only from approved corporate networks, VPNs, or specific locations, thereby reducing unauthorized access risks.

Login Hours

Login Hours is a security feature in Salesforce that allows administrators to control when users can access the system based on their profile. This configuration setting enables organizations to restrict user logins to specific hours of the day and days of the week, providing an additional layer of security and compliance management.

To configure Login Hours, administrators navigate to Setup, then search for Profiles, select the desired profile, and click on Login Hours in the related list. From there, you can set the allowed login times for each day of the week by specifying start and end times. The times are based on the organization's default time zone or the user's individual time zone setting.

When Login Hours are configured, users assigned to that profile can only log in during the specified time windows. If a user attempts to log in outside of the permitted hours, they will receive an error message and be denied access. However, it is important to note that if a user is already logged in when the restricted period begins, they will not be automatically logged out but will be unable to perform any actions until they log in again during permitted hours.

Login Hours work at the profile level, meaning different profiles can have different login hour restrictions. This allows organizations to set varying access schedules for different user groups. For example, sales representatives might have extended hours compared to administrative staff.

This feature is particularly useful for organizations that need to enforce business hour access only, comply with regulatory requirements, reduce security risks during off-hours, or manage international teams across different time zones.

Administrators should carefully plan Login Hours configurations to ensure they align with business operations and user needs while maintaining appropriate security standards. Testing the configuration with a subset of users before full deployment is recommended.

Two-Factor Authentication

Two-Factor Authentication (2FA) is a critical security feature in Salesforce that adds an extra layer of protection to user accounts beyond traditional username and password credentials. This authentication method requires users to verify their identity through two distinct factors before gaining access to the Salesforce platform.

The first factor is something the user knows, typically their standard login credentials (username and password). The second factor is something the user has, which is usually a time-based verification code generated by an authenticator application or sent via SMS to a registered mobile device.

Salesforce administrators can configure 2FA through Setup by navigating to Identity Verification settings. The platform supports multiple verification methods including the Salesforce Authenticator mobile app, third-party TOTP (Time-based One-Time Password) applications like Google Authenticator or Microsoft Authenticator, security keys (U2F), and built-in authenticators.

Administrators can enforce 2FA at various levels. They can require it for all users organization-wide through Session Settings, or apply it selectively through permission sets and profiles. The High Assurance session security level can be configured to mandate 2FA for accessing sensitive features like reports, connected apps, or API access.

When implementing 2FA, administrators should consider user experience and provide clear communication about the enrollment process. Users typically register their verification method during their first login after 2FA is enabled, or administrators can require registration through identity verification settings.

Best practices include enabling 2FA for all users with administrative privileges, users accessing sensitive data, and users connecting through APIs. Administrators should also configure backup verification methods to ensure users can still access their accounts if their primary device is unavailable.

Salesforce provides reporting capabilities to monitor 2FA adoption across the organization through Identity Verification History and Login History reports, helping administrators track compliance and identify users who have not yet enrolled in two-factor authentication.

More Configuration and Setup questions
900 questions (total)