The ability to troubleshoot and audit your data is imperative to enforce governance across enterprise applications. This episode talks about the tools provided by Salesforce to troubleshoot implementations and audit changes to business data across the Salesforce org.
In Episode 10, we will cover the following topics
- Audit Logs & Field History Tracking
- Debug Logs
- Email Logs
- Login History & IP Whitelisting
- Q & A
Debug logs are used to track the events information that occurs in your org.Debugs log will only be generated when you have an active flag turned on for the logged in user. A debug log can record database operations, system processes, and errors that occur when executing a transaction or running unit tests. Debug logs can contain information about:
- Database changes
- HTTP callouts
- Apex errors
- Resources used by Apex
- Automated workflow processes, such as:
- Workflow rules
- Assignment rules
- Approval processes
- Validation rules
- Email logs describe all emails sent through salesforce.com and can be used to help identify the status of an email delivery.
- Email logs are CSV files that provide information such as the email address of each email sender and its recipient, the date and time each email was sent, and any error code associated with each email.
- Logs are only available for the past 30 days.
Setup Audit Trails
- Setup audit trails gives you the picture of all the changes made in your org like Creating a User, Creating Trigger, Page, Component, Modifying any apex class or pages.
- The last 20 entries for your organization are listed below.
- You can download your organization’s setup audit trail for the last six months (Excel .csv file).
Field History Tracking
- Field history tracking is used to track the history of field values from old to new.
- To turn on the Field history for standard object go to Setup -> Customize -> Object Name -> Fields -> Click on “Set History Tracking”
Login History & IP White Listing
- Login History is used to track the Login information of the users
- IP Whitelisting is used to exclude the verification code by adding the IP ranges into Network Access
May the force be with you!
Here is recording of session.
Episode 10 was presented by Amit Singh on Aug 19, 2019 at 7:30 PM Indian Standard Time.
Here is playlist link for all recording
557 total views, 7 views today