Metazoa Snapshot Org Security Center is a suite of six applications that focus on enhancing the security of your Salesforce organization, with a special emphasis on profiles and permission sets. This documentation will guide you through the various features and capabilities of the Org Security Center.
Getting Started
- Download the Metazoa Player and run it.
- Once the Metazoa Player opens, you will be presented with the main screen of the Org Security Center.
- On the left side, you will see a list of applications. Select the application you want to use.
- On the right side, log in to your Salesforce account.
- Click the 'Launch' button to run the selected application.
Applications
1. Profiles and Permission Sets Report
This report displays all your profiles, permission set groups, and permission sets in a matrix format.
- Select the information you want to display (e.g. Apex class access, application visibility, object permissions) across the top.
- Profiles will be displayed on the side, allowing for easy browsing through the matrix.
- You can perform the same actions for permission sets and permission set groups.
- Combined Security Reports show users on the left-hand side and object permissions on the top. It displays the combined impact of a user's profile, permission sets, and permission set groups.
- Customize the report according to your needs, focus on specific aspects, include labels, and choose the display format.
- The best practice is to minimize the use of profiles and start using permission sets and permission set groups for easier maintenance.
2. User Permission Assignments
This application helps in managing and restructuring permission assignments.
- Display users on the left, select a user to view their profile, permission set groups, and permission sets.
- Change the assignments by checking the boxes and clicking the 'Save Assignments' button.
- Flip the view to see permission set groups or permission sets, and view or edit their assignments and contents.
- Create, delete, duplicate or edit items through the context menu (right-click).
- Create permission set groups by selecting permission sets, calculating assignments, and filling in the group information.
- Merge profiles by selecting similar profiles, calculating replacements, and creating new merged profiles with necessary permission sets.
- Generate comprehensive reports documenting all user assignments.
3. User Activity Timeline Report
Monitor user interactions with your Salesforce organization over a specified time frame.
- Select a user, time frame, and types of activities to monitor.
- The Event Log File shows Apex executions, dashboard views, document attachments, report downloads, etc.
- Login History displays login failures and successes.
- Setup Audit Trail covers administrative activities and changes to the organization.
- View the timeline report with all user activities organized by time frame, color-coded based on risk levels.
- Select multiple users for a rollup report.
4. Relationship Hierarchies Report
Easily edit the user role hierarchy which is crucial for controlling data visibility.
- Drag and drop user roles to move them around and restructure the hierarchy.
- Assign users to roles by selecting a role and managing the assigned users.
- Create and delete new roles.
- Generate reports on the user role hierarchy.
5. Salesforce Limits Report
Monitor organizational and individual object limits in Salesforce.
- Customize and color-code the report.
- Select the organizational or individual limits you want to monitor.
- Generate detailed reports, which are useful for security and compliance.
6. Security Health Check Report
Perform regular checks on the security of your Salesforce organization.
- Customize and color-code the report.
- Select security categories of interest.
- Generate detailed and customizable reports, suitable for weekly compliance checks.
Conclusion
Metazoa Snapshot Org Security Center provides a broad range of reports that are invaluable for managing and monitoring your Salesforce organization, as well as resolving issues with profiles and permissions. By utilizing these tools, you can enhance the security and operational efficiency of your organization.