Configuring the FSM Module Securely

The FSM module offers a high degree of customization, allowing businesses to adapt it to their unique requirements. While this flexibility is a strength, it also carries the risk of inadvertently introducing security risks. This section focuses on critical aspects of the FSM configuration, where improper adjustments could have significant security implications.

Warning:

Make sure that only trained employees are given access to the Field Service Configuration record type. Access to this record type should be highly restricted.

General Notices