Search icon
Subscription
0
Cart icon
Close icon
You have no products in your basket yet
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Becoming a Dynamics 365 Finance and Supply Chain Solution Architect

You're reading from  Becoming a Dynamics 365 Finance and Supply Chain Solution Architect

Product type Book
Published in Jun 2023
Publisher Packt
ISBN-13 9781804611494
Pages 270 pages
Edition 1st Edition
Languages
Author (1):
Brent Dawson Brent Dawson
Profile icon Brent Dawson

Table of Contents (18) Chapters

Preface 1. Part 1: Architectural Considerations and Best Practices for D365 Finance and SCM
2. Chapter 1: Overcoming Challenges in D365 Finance and SCM Projects 3. Chapter 2: Understanding the Microsoft FastTrack© Process 4. Chapter 3: Dealing with Integrations 5. Chapter 4: Efficient Security Design 6. Chapter 5: Planning for Successful Data Migration 7. Chapter 6: Licensing Challenges 8. Part 2: From Solution Design to Deployment – Practical Advice
9. Chapter 7: How to Plan a D365 F&SCM Project 10. Chapter 8: Learning the Client’s Business 11. Chapter 9: Collecting Project Requirements 12. Chapter 10: ALM Tools and Applications 13. Chapter 11: Human Change Management 14. Chapter 12: Building a Blueprint Solution 15. Chapter 13: Deploying the Project Solution 16. Index 17. Other Books You May Enjoy

Security configuration diagnostics

Another important tool that can assist license counts is the D365 Security diagnostics tool for task recordings. This feature in D365 Finance and SCM allows administrators to analyze the security requirements for a specific task or process. By generating an Excel file with detailed information about the necessary security roles, duties, and privileges for a recorded task, administrators can ensure that users have the appropriate level of access to perform their job functions while maintaining compliance with organizational security policies.

The process involves creating a task recording, capturing the actions performed during the task, and then generating security diagnostics based on the recording. This helps identify gaps in security or areas where user access needs to be adjusted, ensuring that only authorized users can access sensitive data and perform critical operations within the system. This feature is particularly useful for troubleshooting...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime}