Role to User Assignments Report

Investigating User Roles and Access Levels

Question

Note: This question is part of a series of questions that present the same scenario.

Each question in the series contains a unique solution that might meet the stated goals.

Some question sets might have more than one correct solution, while others might not have a correct solution.

After you answer a question in this section, you will NOT be able to return to it.

As a result, these questions will not appear in the review screen.

You are a Dynamics 365 Finance security administrator.

When testing security setups, users report that certain roles are gaining access to sensitive information via a form in the system.

You must investigate which user roles have what visibility and access level to system objects, and then send a report to the implementation team to address security compliance concerns.

You need to report the information from the system.

Solution: Generate the Role to user assignments report.

Does the solution meet the goal?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B.

B.

https://docs.microsoft.com/en-us/dynamics365/fin-ops-core/dev-itpro/sysadmin/security-reports

The solution proposed in the scenario appears to be a valid approach to investigate which user roles have what visibility and access level to system objects in Dynamics 365 Finance. The suggested approach is to generate the Role to user assignments report, which can provide a comprehensive list of all roles and their corresponding assignments to users within the system.

The Role to user assignments report displays all security roles defined in Dynamics 365 Finance and Operations and the users to whom these roles have been assigned. The report also shows the level of access granted to each role, including the rights to create, read, update, and delete records for specific entities within the system.

By generating this report, the security administrator can quickly identify the roles that have access to sensitive information and the specific users who hold these roles. This information can be used to assess the level of security compliance within the system and to determine if any changes are required to improve the security posture of the organization.

Therefore, the proposed solution meets the goal of investigating which user roles have what visibility and access level to system objects and sending a report to the implementation team to address security compliance concerns.