Einstein Bots Although this is beyond the scope of this book, I want to spend a few minutes talking about Einstein Bots. Einstein Bots, which is an add-on for Live Agent (Chat), provides us with an automated way to interact with customers without using one of the precious resources of our call center: the agent’s…
Einstein Bots 2 – Certified Advanced Salesforce Admin Exam Guide
A new entitlement is automatically created based on the Entitlement Template’s configuration. SLAs can be as easy as checking whether a customer has support for their contract, though they can be more complex if we need to enforce case resolution within a given amount of time. Entitlement processes configure the timeline with steps (called Milestones)…
802.11 Original Authentication Methods
802.11 Original Authentication Methods (39.6.9) Although SSID cloaking and MAC address filtering would deter most users, the reality is that neither feature would deter a crafty intruder. SSIDs are easily discovered even if APs do not broadcast them, and MAC addresses can be spoofed. The best way to secure a wireless network is to use…
Improving Data Quality with Duplicate Management
Improving Data Quality with Duplicate Management After looking at key sales and service features, let’s go back to data quality. In this chapter, you’ll learn how to provide data consistency using duplicate management for standard and custom objects by defining duplicate and matching rules. Using duplicate record management, we can keep data clean and accurate…
Man-in-the-Middle Attack – 100-150 Exam Study Guide
Man-in-the-Middle Attack (39.6.5) In a man-in-the-middle (MITM) attack, also known as an on-path attack, the hacker is positioned in between two legitimate entities in order to read or modify the data that passes between the two parties. There are many ways in which to create an MITM attack. A popular wireless MITM attack is called…
Local duplicate management – Certified Advanced Salesforce Admin Exam Guide
Local duplicate management Local duplicate management is the part of duplicate management that is related to how the user interacts with duplicates. To have a look at the standard rules, navigate to Setup | Data | Duplicate Management | Duplicate Rules to bring up the following page: Duplicate Rules main page Let’s edit the Contact…
Wireless Security Overview – 100-150 Exam Study Guide
Wireless Security Overview (39.6.2) A WLAN is open to anyone within range of a wireless access point (AP) and the appropriate credentials to associate to it. With a wireless NIC and knowledge of cracking techniques, an attacker may not have to physically enter the workplace to gain access to its network over a WLAN. Attacks…
Global duplicate management – Certified Advanced Salesforce Admin Exam Guide
Global duplicate management What if we decide to activate duplicate management after our sales reps have already created lots of leads? We cannot ask all our sales reps to open leads one by one to check duplicates and merge them; that will definitely be a waste of time. For this purpose, we can use duplicate…
Host-Based Firewalls – 100-150 Exam Study Guide
Host-Based Firewalls (39.5.6) Host-based personal firewalls are standalone software programs that control traffic entering or leaving a computer. Firewall apps are also available for Android phones and tablets. Host-based firewalls may use a set of predefined policies, or profiles, to control packets entering and leaving a computer. They also may have rules that can be…
Exploring and customizing rules
Exploring and customizing rules In this section, we will learn how to customize the duplicate and matching rules. Customizing duplicate rules As we have already seen in the previous sections, duplicate rules are used to alert on potential duplicates or prevent potential duplicates for a given record (if it is used on objects other than…