Salesforce Shield

Salesforce Shield lets customers see who is doing what with sensitive data, know the state and value of their data going back up to ten years, and encrypt sensitive data at rest, while still preserving business functionality. It is declarative.

Salesforce Shield includes three core services:

Event Monitoring 

  • Captured daily
  • 28 event types captured
  1. Apex Callout 
  2. Async Report 
  3. Content Transfer 
  4. Logout 
  5. Report Export 
  6. Time-Based Workflow
  7. Apex Execution 
  8. Bulk API 
  9. Dashboard 
  10. MDAPI Operation 
  11. REST API 
  12. URI
  13. Apex SOAP 
  14. Change Set Operation
  15. Document Attachment Downloads
  16. Multiblock Report
  17. Salesforce1 Adoption (UI Tracking)
  18. Visualforce
  19. Apex Trigger 
  20. Content Distribution
  21. Login 
  22. Package Install 
  23. Sandbox
  24. API Content
  25. Document Link
  26. Login As 
  27. Report 
  28. Sites
  • 30 days of events retained
  • Log files are exposed via the API
  • Data available the following day

Below can be done using the log captured

  • Use Analytics Cloud, or:
  • Import data into any BI tool
  • Build an app
  • Use pre-built AppExchange apps
  • Export to CSV file

Field Audit Trail
Note:
Field Audit Trail is similar to Field History tracking. It is not like Set Up Audit trail.

Field Audit Trail captures the full life cycle of your data so you can quickly determine the state and value of your data for any date, at any time and define the data retention policy so data is deleted when no longer needed.

Tracks up to 10 years of history with 60 fields per object.

Now you can define rules for how your data is stored in production and archive environments with point-and-click tools.

Platform Encryption
Shield Platform Encryption gives your data a whole new layer of security while preserving critical platform functionality. It enables you to encrypt sensitive data at rest, and not just when transmitted over a network, so your company can confidently comply with privacy policies, regulatory requirements, and contractual obligations for handling private data.

Leave a Reply