MB2 - 716 Flashcards
What are the three offerings out of the box?
Sales, Marketing and Service modules
What are the 4 types of clients for D365?
- Web
- Outlook
- Phones/Tablet
- Completely custom
What browsers are supported for the web client?
IE 10 and 11 Edge Firefox Chrome Safari
What are the two types of Outlook clients?
- Traditional outlook client
2. Outlook app
Two main features for the traditional Outlook client
- Syncs CRM records with outlook folders
2. Provide offline capabilities
Three things to know about Outlook app
- no client to install
- works in outlook and OWA
- Downloads directly from CRM
4 main purpose of the security model
- control access to records
- control access to UI elements (forms, dashboards, bpfs)
- Control access to features
- Simplify the user experience
Can the system admin role be modified?
No. At least one person must be the sys. admin at all times.
Security levels are defined at what levels?
- Entity/record
2. Task: print, merge, go offline, etc.
What is the most basic security unit in CRM? What does it define?
privilege
What actions a user can perform in each entity: Create contact, read accounts, update invoices, delete contacts, etc.
What are the eight common privileges in CRM?
- Create
- Update
- Read
- Delete
- Share
- Append
- Append To
- Assign
Privileges work with ________ in conjunction when defining security. What does the answer for the blank define?
Access Levels. Define which records for that entity a user can perform actions upon.
Access levels are based on a combination of?
Record Ownership + Business Unit that the user belongs to.
What is required in order for a team to own records?
Security roles
A team can belong to how many business units?
Only ONE
A team can only consist of teammates from one business unit.
True/False?
FALSE.
How does security roles work for users in a team?
The security roles for both users and team are combined, and the user is granted the LEAST RESTRICTIVE access level for that record type and privilege.
Can a team be assigned multiple security roles? What happens if a team is assigned to multiple roles?
Yes.
Priv/roles are combined and users/team are granted the LEAST RESTRICTIVE access level for that record type and privilege.
What are the five access levels?
- none
- user
- business unit
- parent: child business unit
- organization
What is the purpose of a business unit in terms of security?
Define boundaries for security role access levels
What does a business unit contain?
users, teams, security roles
What is the first business unit?
the “Root” business unit. It is created when the organization is deployed, with the same name as the organization.
What are the three similarities/contrasts between the root BU and child BU’s
Both Root and Child BU can be renamed.
Root:
- can’t be deleted/disabled
- can’t be moved to have a parent BU
Child:
- can be deleted/disabled
- can be moved to have a parent BU
How are user credentials verified when a user is logging into CRM?
on-prem: AD
online: Office 365
Can you a delete a user?
no
How do you prevent a user from accessing?
Disable the user
What happens when you change a user/team’s business unit?
It removes all security role. Access is denied until new ones are assigned.
Can you add/remove users to/from the default team of each BU?
No.
What are the two basic types of teams?
Access: Grants specific permissions to individual records
Owner: Records can be owned by multiple users as opposed to individual user
When to use Owner Team?
- Records owned by group instead of individual users
- Number of teams is known at design time
- Reporting on progress by teams is required
When to use Access Team?
- Team needs to be dynamically formed/dissolved.
- Number of teams is not know at design time
- Team members require different access rights to records
- Some use require single access to records without ownership
Duplicate Detection can only be scheduled between how many days?
7~365 days
When does auditing take into affect?
When it’s enabled for the organization in system settings
What can you audit in CRM?
entities and specific fields.
The hierarchy security must be enabled before you can configure it for use.
True/False
True
What are the two types of hierarchy security?
- Manager
2. Position
Within the context of hierarchy security, the manager must reside in the same business unit or in the parent business unit of the person(s) they directly/indirectly manage.
True/False?
Yes.
4 types of process/workflows from the process center are?
- Business Process Flow
- Workflow: Background/Realtime
- Dialog
- Custom Action
Custom workflow always run asynchronously/synchronously when called from code or Process?
synchronously.
Workflows can be started in what ways?
- manually
- by another workflow or dialog
- automatically: record is created, status changes, assigned, field changes, deleted
- any combination of the above