SlideShare a Scribd company logo
Build Your Security Superpowers:
Security Best Practices for Admins
Devanshu Patel
Sr. Security Engagement Manager
Safe Harbor
Safe harbor statement under the Private Securities Litigation Reform Act of 1995:
This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties materialize
or if any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed or implied by
the forward-looking statements we make. All statements other than statements of historical fact could be deemed forward-looking, including any
projections of product or service availability, subscriber growth, earnings, revenues, or other financial items and any statements regarding
strategies or plans of management for future operations, statements of belief, any statements concerning new, planned, or upgraded services or
technology developments and customer contracts or use of our services.
The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new functionality
for our service, new products and services, our new business model, our past operating losses, possible fluctuations in our operating results and
rate of growth, interruptions or delays in our Web hosting, breach of our security measures, the outcome of any litigation, risks associated with
completed and any possible mergers and acquisitions, the immature market in which we operate, our relatively limited operating history, our
ability to expand, retain, and motivate our employees and manage our growth, new releases of our service and successful customer deployment,
our limited history reselling non-salesforce.com products, and utilization and selling to larger enterprise customers. Further information on
potential factors that could affect the financial results of salesforce.com, inc. is included in our annual report on Form 10-K for the most recent
fiscal year and in our quarterly report on Form 10-Q for the most recent fiscal quarter. These documents and others containing important
disclosures are available on the SEC Filings section of the Investor Information section of our Web site.
Any unreleased services or features referenced in this or other presentations, press releases or public statements are not currently available and
may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon features that are
currently available. Salesforce.com, inc. assumes no obligation and does not intend to update these forward-looking statements.
Why are we here?
Security is a partnership with our customers.
Setting Security Controls will improve your org’s health.
Users are on the front line.
When it comes to you and Salesforce…
Security Superpowers
Password Security
Two Factor Authentication
Phishing Prevention
Login IP Ranges
Password Sharing =
​Security Risk
​Loss of access control
​Compromise will be blamed on the account
owner
​Effective insider threat technique
You Own Your Password
Ownership has rights and responsibilities
OPPWAD
Other People’s Passwords Are Dangerous!
​Never share your Salesforce account
password with anyone
​Do not accept Salesforce credentials
from anyone
​If someone gives you their Salesforce
credentials, report it to
security@salesforce.com
Password Security
Password security is the first line of defense.
​Use strong passwords
• Preferably minimum 12 characters and
three character types (upper, lower,
numeric, symbols)
​Regularly change passwords
​Never reuse passwords on other accounts
​Never share passwords (OPPWAD)
​Deactivate passwords when people leave
Weak Passwords Can Be Hacked
​Weak passwords (under 8 characters or real words) are easy prey
​Password cracking software can break them easily
Strong Passwords Can Be Compromised
Social engineering Weak Security Questions
How Two Factor Authentication Works
+
Why Two Factor Authentication Is Secure
Provides an extra layer of
security beyond a password.
Protects account access even
if the user’s password is
compromised.
Salesforce Authenticator
Protects account access
even if the user’s password
is compromised
Significantly reduces
vulnerability
Great resource:
www.twofactorauth.org
Login IP Ranges
​Available to all customers
​Only access Salesforce from a designated set of IP Ranges. Two levels:
​Org-level Trusted IP Ranges (permissive)
​Profile-level Login IP Ranges (restrictive)
Enterprise, Unlimited, Performance, Developer:
Manage Users | Profiles
Contact Mgr, Group, Professional:
Security Controls | Session Settings
For more info, search Help & Training
Recommendation
 Org-wide Trusted IP Ranges → all users in your organization
 Profile- based login IP range restrictions → employees with
access to lots of data or sensitive materials (Admins,
Developers)
 Profile- based login IP range restrictions --> users connecting
from the same locations.
Phishing
​Educate your Salesforce users!
​If your users get a “Salesforce” e-mail, have them reach out to you or your
security team to double check that it is legitimate
​If you are not sure about a ”Salesforce" e-mail, ask us, by forwarding to
security@salesforce.com
Phishing Superpowers
​Hover over links to validate.
​Does the e-mail context make sense?
​Does the e-mail sender make sense?
​Look for typos/grammatical errors.
​Beware Clickbait!
• Using emotion to entice you to click immediately
• Fear (Your account will be closed)
• Reward (First 100 users get a free eye exam!)
Phishing Spoof
​Hover over links to validate.
​Does the e-mail context make
sense?
​Does the e-mail sender make
sense?
​Does Salesforce send receipts in
this manner? Are you normally a
recipient?
​Look for typos/grammatical errors.
​Beware Clickbait!
Real Salesforce E-Mail
Look for:
Legitimate @salesforce.com or @exacttarget.com
address
Links go to www.salesforce.com or App Stores
(hover with your mouse)
Call to action not overly aggressive
Phishing Takeaways
​Hover over links and sender address to validate.
​Does the e-mail context make sense?
​Does the e-mail sender make sense?
​Look for typos/grammatical errors.
​Beware Clickbait!
• Using emotion to entice you to click immediately
• Fear (Your account will be closed)
• Reward (First 100 users get a free eye exam!)
​Have users e-mail admin/security
​Admin/Security can e-mail security@salesforce.com
● Deactivate users as soon as
possible
● Deactivation removes login access
while preserving historical activity
and records
● Sometimes users cannot be
deactivated: assign new user or
reassign approval responsibility first
● Know your IT department’s
termination process
User Deactivation
Best practice:
Freeze users first!
From Setup, click Manage Users | Users.
Click Edit next to a user’s name.
Deselect the Active checkbox and then click Save.
Security Superpowers
Password Security
Two Factor Authentication
Phishing
Login IP Ranges
Thank you

More Related Content

PDF
Securing Your Salesforce Deployment with Two Factor Authentication
PDF
Secure Salesforce: Secret Storage in Your Salesforce Instance
PDF
Secure Your Salesforce Org with Two-Factor Authentication
PPTX
Integrating The Cloud - How to integrate Salesforce
PDF
Secure Salesforce: External App Integrations
PDF
Salesforce Identity: Identity Management Made Easy
PDF
Salesforce Identity: Don't Treat Your Customers Like Your Employees
PPT
Security and Your Salesforce Org
Securing Your Salesforce Deployment with Two Factor Authentication
Secure Salesforce: Secret Storage in Your Salesforce Instance
Secure Your Salesforce Org with Two-Factor Authentication
Integrating The Cloud - How to integrate Salesforce
Secure Salesforce: External App Integrations
Salesforce Identity: Identity Management Made Easy
Salesforce Identity: Don't Treat Your Customers Like Your Employees
Security and Your Salesforce Org

Similar to NYC Admin Zone: Build Your Security Superpowers (20)

PDF
How to Become a Security-Minded Admin
PDF
Sensibilisation à la Sécurité Salesforce
PPTX
Securing Your Salesforce Org: The Human Factor
PDF
Salesforce New Jersey User Group - Security Awareness
PDF
How to be a SalesFIERCE Admin - Jared Miller & Davina Hanchuck
PPTX
How to be a SalesFIERCE Salesforce Admin
PDF
Secure Salesforce: Org Access Controls
PPTX
How to be a Security Minded Admin by Chris Zullo
PDF
Admin Best Practices: Remove Security Risk From Your Org with a User Audit
PPTX
Top 5 User Problems Admins Solve by Colleen Burnsed & Meagan Diegalman
PDF
SalesforceA Webinar
PDF
[Delivering Salesforce secure access to remote workforce
PDF
Setting up Security in Your Salesforce Instance
PDF
Essential Habits for Salesforce Admins: Security
PDF
10 Easy Steps to Mastering Org Security
PDF
Getting started with Salesforce security
PDF
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
POTX
OAuth for Non Developers in Salesforce
PPTX
Security Boundaries in Apex
PDF
Five Developer Tips Every Admin Needs To Know
How to Become a Security-Minded Admin
Sensibilisation à la Sécurité Salesforce
Securing Your Salesforce Org: The Human Factor
Salesforce New Jersey User Group - Security Awareness
How to be a SalesFIERCE Admin - Jared Miller & Davina Hanchuck
How to be a SalesFIERCE Salesforce Admin
Secure Salesforce: Org Access Controls
How to be a Security Minded Admin by Chris Zullo
Admin Best Practices: Remove Security Risk From Your Org with a User Audit
Top 5 User Problems Admins Solve by Colleen Burnsed & Meagan Diegalman
SalesforceA Webinar
[Delivering Salesforce secure access to remote workforce
Setting up Security in Your Salesforce Instance
Essential Habits for Salesforce Admins: Security
10 Easy Steps to Mastering Org Security
Getting started with Salesforce security
Introducing salesforce shield - Paris Salesforce Developer Group - Oct 15
OAuth for Non Developers in Salesforce
Security Boundaries in Apex
Five Developer Tips Every Admin Needs To Know
Ad

More from Salesforce Admins (20)

PDF
Admin Best Practices: Dashboards for Every Admin
PDF
Admin Best Practices: Building Useful Formulas
PDF
Admin Best Practices: 3 Steps to Seamless Deployments
PDF
Awesome Admins Automate: Integrate Flow with AI and Chatbots
PDF
#AwesomeAdmins Automate: Create Triggered Flows and Batch Jobs
PDF
Admin Best Practices: Introducing Einstein Recommendation Builder
PDF
Essential Habits for New Admins
PDF
Essential Habits for Salesforce Admins: Actionable Analytics
PDF
Essential Habits for Salesforce Admins: Data Management
PDF
Essential Habits for Salesforce Admins: User Management
PPTX
Admin Best Practices: Explore the Power of Data with Tableau
PPTX
Essential Habits for New Admins
PDF
Admin trailhead Live: Leverage Einstein Search to Increase Productivity
PDF
Admin Best Practices: Reports & Dashboards
PDF
Trailhead Live: Essential Habits & Core Admin Responsibilities
PDF
Build AI-Powered Predictions with Einstein Prediction Builder
PDF
Trailhead Live: Build an Awesome Team of Admins
PDF
Semper Salesforce: Become a Salesforce Military Champion
PDF
Best Practices and Tools for Backing Up Salesforce Data
PDF
WT19: An Amazing Lightning Transition in Review
Admin Best Practices: Dashboards for Every Admin
Admin Best Practices: Building Useful Formulas
Admin Best Practices: 3 Steps to Seamless Deployments
Awesome Admins Automate: Integrate Flow with AI and Chatbots
#AwesomeAdmins Automate: Create Triggered Flows and Batch Jobs
Admin Best Practices: Introducing Einstein Recommendation Builder
Essential Habits for New Admins
Essential Habits for Salesforce Admins: Actionable Analytics
Essential Habits for Salesforce Admins: Data Management
Essential Habits for Salesforce Admins: User Management
Admin Best Practices: Explore the Power of Data with Tableau
Essential Habits for New Admins
Admin trailhead Live: Leverage Einstein Search to Increase Productivity
Admin Best Practices: Reports & Dashboards
Trailhead Live: Essential Habits & Core Admin Responsibilities
Build AI-Powered Predictions with Einstein Prediction Builder
Trailhead Live: Build an Awesome Team of Admins
Semper Salesforce: Become a Salesforce Military Champion
Best Practices and Tools for Backing Up Salesforce Data
WT19: An Amazing Lightning Transition in Review
Ad

Recently uploaded (20)

PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PPTX
Machine Learning_overview_presentation.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PPT
Teaching material agriculture food technology
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
A comparative analysis of optical character recognition models for extracting...
Empathic Computing: Creating Shared Understanding
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Dropbox Q2 2025 Financial Results & Investor Presentation
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
Machine Learning_overview_presentation.pptx
Network Security Unit 5.pdf for BCA BBA.
Teaching material agriculture food technology
MIND Revenue Release Quarter 2 2025 Press Release
Reach Out and Touch Someone: Haptics and Empathic Computing
Big Data Technologies - Introduction.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Spectral efficient network and resource selection model in 5G networks
“AI and Expert System Decision Support & Business Intelligence Systems”
Accuracy of neural networks in brain wave diagnosis of schizophrenia
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Spectroscopy.pptx food analysis technology
The Rise and Fall of 3GPP – Time for a Sabbatical?
Advanced methodologies resolving dimensionality complications for autism neur...

NYC Admin Zone: Build Your Security Superpowers

  • 1. Build Your Security Superpowers: Security Best Practices for Admins Devanshu Patel Sr. Security Engagement Manager
  • 2. Safe Harbor Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation may contain forward-looking statements that involve risks, uncertainties, and assumptions. If any such uncertainties materialize or if any of the assumptions proves incorrect, the results of salesforce.com, inc. could differ materially from the results expressed or implied by the forward-looking statements we make. All statements other than statements of historical fact could be deemed forward-looking, including any projections of product or service availability, subscriber growth, earnings, revenues, or other financial items and any statements regarding strategies or plans of management for future operations, statements of belief, any statements concerning new, planned, or upgraded services or technology developments and customer contracts or use of our services. The risks and uncertainties referred to above include – but are not limited to – risks associated with developing and delivering new functionality for our service, new products and services, our new business model, our past operating losses, possible fluctuations in our operating results and rate of growth, interruptions or delays in our Web hosting, breach of our security measures, the outcome of any litigation, risks associated with completed and any possible mergers and acquisitions, the immature market in which we operate, our relatively limited operating history, our ability to expand, retain, and motivate our employees and manage our growth, new releases of our service and successful customer deployment, our limited history reselling non-salesforce.com products, and utilization and selling to larger enterprise customers. Further information on potential factors that could affect the financial results of salesforce.com, inc. is included in our annual report on Form 10-K for the most recent fiscal year and in our quarterly report on Form 10-Q for the most recent fiscal quarter. These documents and others containing important disclosures are available on the SEC Filings section of the Investor Information section of our Web site. Any unreleased services or features referenced in this or other presentations, press releases or public statements are not currently available and may not be delivered on time or at all. Customers who purchase our services should make the purchase decisions based upon features that are currently available. Salesforce.com, inc. assumes no obligation and does not intend to update these forward-looking statements.
  • 3. Why are we here?
  • 4. Security is a partnership with our customers. Setting Security Controls will improve your org’s health. Users are on the front line.
  • 5. When it comes to you and Salesforce…
  • 6. Security Superpowers Password Security Two Factor Authentication Phishing Prevention Login IP Ranges
  • 7. Password Sharing = ​Security Risk ​Loss of access control ​Compromise will be blamed on the account owner ​Effective insider threat technique You Own Your Password Ownership has rights and responsibilities
  • 8. OPPWAD Other People’s Passwords Are Dangerous! ​Never share your Salesforce account password with anyone ​Do not accept Salesforce credentials from anyone ​If someone gives you their Salesforce credentials, report it to security@salesforce.com
  • 9. Password Security Password security is the first line of defense. ​Use strong passwords • Preferably minimum 12 characters and three character types (upper, lower, numeric, symbols) ​Regularly change passwords ​Never reuse passwords on other accounts ​Never share passwords (OPPWAD) ​Deactivate passwords when people leave
  • 10. Weak Passwords Can Be Hacked ​Weak passwords (under 8 characters or real words) are easy prey ​Password cracking software can break them easily
  • 11. Strong Passwords Can Be Compromised Social engineering Weak Security Questions
  • 12. How Two Factor Authentication Works +
  • 13. Why Two Factor Authentication Is Secure Provides an extra layer of security beyond a password. Protects account access even if the user’s password is compromised.
  • 14. Salesforce Authenticator Protects account access even if the user’s password is compromised Significantly reduces vulnerability Great resource: www.twofactorauth.org
  • 15. Login IP Ranges ​Available to all customers ​Only access Salesforce from a designated set of IP Ranges. Two levels: ​Org-level Trusted IP Ranges (permissive) ​Profile-level Login IP Ranges (restrictive) Enterprise, Unlimited, Performance, Developer: Manage Users | Profiles Contact Mgr, Group, Professional: Security Controls | Session Settings For more info, search Help & Training
  • 16. Recommendation  Org-wide Trusted IP Ranges → all users in your organization  Profile- based login IP range restrictions → employees with access to lots of data or sensitive materials (Admins, Developers)  Profile- based login IP range restrictions --> users connecting from the same locations.
  • 17. Phishing ​Educate your Salesforce users! ​If your users get a “Salesforce” e-mail, have them reach out to you or your security team to double check that it is legitimate ​If you are not sure about a ”Salesforce" e-mail, ask us, by forwarding to security@salesforce.com
  • 18. Phishing Superpowers ​Hover over links to validate. ​Does the e-mail context make sense? ​Does the e-mail sender make sense? ​Look for typos/grammatical errors. ​Beware Clickbait! • Using emotion to entice you to click immediately • Fear (Your account will be closed) • Reward (First 100 users get a free eye exam!)
  • 19. Phishing Spoof ​Hover over links to validate. ​Does the e-mail context make sense? ​Does the e-mail sender make sense? ​Does Salesforce send receipts in this manner? Are you normally a recipient? ​Look for typos/grammatical errors. ​Beware Clickbait!
  • 20. Real Salesforce E-Mail Look for: Legitimate @salesforce.com or @exacttarget.com address Links go to www.salesforce.com or App Stores (hover with your mouse) Call to action not overly aggressive
  • 21. Phishing Takeaways ​Hover over links and sender address to validate. ​Does the e-mail context make sense? ​Does the e-mail sender make sense? ​Look for typos/grammatical errors. ​Beware Clickbait! • Using emotion to entice you to click immediately • Fear (Your account will be closed) • Reward (First 100 users get a free eye exam!) ​Have users e-mail admin/security ​Admin/Security can e-mail security@salesforce.com
  • 22. ● Deactivate users as soon as possible ● Deactivation removes login access while preserving historical activity and records ● Sometimes users cannot be deactivated: assign new user or reassign approval responsibility first ● Know your IT department’s termination process User Deactivation Best practice: Freeze users first! From Setup, click Manage Users | Users. Click Edit next to a user’s name. Deselect the Active checkbox and then click Save.
  • 23. Security Superpowers Password Security Two Factor Authentication Phishing Login IP Ranges

Editor's Notes

  • #3: Key Takeaway:We are a publicly traded company. Please make your buying decisions only on the products commercially available from Salesforce.com. Talk Track: Before I begin, just a quick note that when considering future developments, whether by us or with any other solution provider, you should always base your purchasing decisions on what is currently available.
  • #16: https://docs.google.com/a/salesforce.com/document/d/14JpvFkQQWgGoOS991S9QUDxdPCEpTIE_b607FqzrcAQ/edit
  • #23: http://www.buttonclickadmin.com/users-may-come-go-records-must-live/ - blog post on user deactivation