Skip to content

Commit 602aed5

Browse files
committed
Learn Editor: Update protect-salesforce.md
1 parent 7c3c056 commit 602aed5

File tree

1 file changed

+23
-23
lines changed

1 file changed

+23
-23
lines changed

CloudAppSecurityDocs/protect-salesforce.md

Lines changed: 23 additions & 23 deletions
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ You can use the following built-in policy templates to detect and notify you abo
5555

5656
| Type | Name |
5757
| ---- | ---- |
58-
| Built-in anomaly detection policy | [Activity from anonymous IP addresses](anomaly-detection-policy.md#activity-from-anonymous-ip-addresses)<br />[Activity from infrequent country](anomaly-detection-policy.md#activity-from-infrequent-country)<br />[Activity from suspicious IP addresses](anomaly-detection-policy.md#activity-from-suspicious-ip-addresses)<br />[Impossible travel](anomaly-detection-policy.md#impossible-travel)<br />[Activity performed by terminated user](anomaly-detection-policy.md#activity-performed-by-terminated-user) (requires Microsoft Entra ID as IdP)<br />[Multiple failed login attempts](anomaly-detection-policy.md#multiple-failed-login-attempts)<br />[Unusual administrative activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual file deletion activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual file share activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual impersonated activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual multiple file download activities](anomaly-detection-policy.md#unusual-activities-by-user) |
58+
| Built-in anomaly detection policy | [Activity from anonymous IP addresses](anomaly-detection-policy.md#activity-from-anonymous-ip-addresses)<br />[Activity from infrequent country](anomaly-detection-policy.md#activity-from-infrequent-country)<br />[Activity from suspicious IP addresses](anomaly-detection-policy.md#activity-from-suspicious-ip-addresses)<br />[Impossible travel](anomaly-detection-policy.md#impossible-travel)<br />[Activity performed by terminated user](anomaly-detection-policy.md#activity-performed-by-terminated-user) (requires Microsoft Entra ID as IdP)<br />[Multiple failed login attempts](anomaly-detection-policy.md#multiple-failed-login-attempts)<br />[Unusual administrative activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual file deletion activities](anomaly-detection-policy.md#unusual-activities-by-user) (Temporarily not supported due to limitation in Salesforce API)<br />[Unusual file share activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual impersonated activities](anomaly-detection-policy.md#unusual-activities-by-user)<br />[Unusual multiple file download activities](anomaly-detection-policy.md#unusual-activities-by-user) |
5959
| Activity policy template | Logon from a risky IP address<br />Mass download by a single user|
6060
| File policy template | Detect a file shared with an unauthorized domain<br />Detect a file shared with personal email addresses|
6161

@@ -102,15 +102,15 @@ This section provides instructions for connecting Microsoft Defender for Cloud
102102

103103
* Sign in to your Salesforce account and go to the **Setup Home** page.
104104

105-
* Under **Administration** -> **Users**, go to the **Profiles** page.
106-
107-
![Salesforce manage users profiles.](media/salesforce-profiles.png)
108-
105+
* Under **Administration** -> **Users**, go to the **Profiles** page.
106+
107+
![Salesforce manage users profiles.](media/salesforce-profiles.png)
108+
109109
* Create a new profile by selecting **New Profile**.
110-
* Choose the profile you just created to deploy Defender for Cloud Apps and select **Edit**. This profile will be used for the Defender for Cloud Apps service account to set up the App connector.
111-
112-
![Salesforce edit profile.](media/salesforce-edit-profile.png)
113-
110+
* Choose the profile you just created to deploy Defender for Cloud Apps and select **Edit**. This profile will be used for the Defender for Cloud Apps service account to set up the App connector.
111+
112+
![Salesforce edit profile.](media/salesforce-edit-profile.png)
113+
114114
* Make sure you have the following checkboxes enabled:
115115
* **API Enabled**
116116
* **View All Data**
@@ -125,20 +125,20 @@ This section provides instructions for connecting Microsoft Defender for Cloud
125125
1. If your organization has **Salesforce CRM Content** enabled, make sure that the current administrative account has it enabled as well.
126126
1. Go to the Salesforce **Setup Home** page.
127127

128-
1. Under **Administration** -> **Users**, go to the **Users** page.
129-
130-
![Salesforce menu users.](media/salesforce-menu-users.png)
131-
128+
1. Under **Administration** -> **Users**, go to the **Users** page.
129+
130+
![Salesforce menu users.](media/salesforce-menu-users.png)
131+
132132
1. Select the current administrative user to your dedicated Defender for Cloud Apps user.
133133

134-
1. Make sure that the **Salesforce CRM Content User** check box is selected.
135-
136-
![Salesforce crm content user.](media/salesforce-crm-content-user.png)
137-
138-
1. Go to **Setup Home** -> **Security** -> **Session Settings**. Under **Session Settings**, make sure that **Lock sessions to the IP address from which they originated** check box is **not** selected.
139-
140-
![Salesforce session settings.](media/salesforce-setup-session-settings.png)
141-
134+
1. Make sure that the **Salesforce CRM Content User** check box is selected.
135+
136+
![Salesforce crm content user.](media/salesforce-crm-content-user.png)
137+
138+
1. Go to **Setup Home** -> **Security** -> **Session Settings**. Under **Session Settings**, make sure that **Lock sessions to the IP address from which they originated** check box is **not** selected.
139+
140+
![Salesforce session settings.](media/salesforce-setup-session-settings.png)
141+
142142
1. Select **Save**.
143143

144144
1. Go to **Apps** -> **Feature Settings** -> **Salesforce Files** -> **Content Deliveries and Public Links**.
@@ -156,15 +156,15 @@ This section provides instructions for connecting Microsoft Defender for Cloud
156156
1. In the **App connectors** page, select **+Connect an app** followed by **Salesforce**.
157157

158158
![Connect Salesforce.](media/connect-salesforce.png)
159-
159+
160160
1. In the next window, give the connection a name and select **Next**.
161161

162162
1. In the **Follow the link** page, select **Connect Salesforce**.
163163

164164
1. This opens the Salesforce sign in page. Enter your credentials to allow Defender for Cloud Apps access to your team's Salesforce app.
165165

166166
![Salesforce sign-in.](media/salesforce-logon.png)
167-
167+
168168
1. Salesforce will ask you if you want to allow Defender for Cloud Apps access to your team information and activity log and perform any activity as any team member. To continue, select **Allow**.
169169

170170
1. At this point, you'll receive a success or failure notice for the deployment. Defender for Cloud Apps is now authorized in Salesforce.com.

0 commit comments

Comments
 (0)