Note: This question is part of a series of questions that present the same scenario.
Each question in the series contains a unique solution that might meet the stated goals.
Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it.
As a result, these questions will not appear in the review screen.
You are a Dynamics 365 Finance security administrator.
When testing security setups, users report that certain roles are gaining access to sensitive information via a form in the system.
You must investigate which user roles have what visibility and access level to system objects, and then send a report to the implementation team to address security compliance concerns.
You need to report the information from the system.
Solution: Generate the User role assignments report.
Does the solution meet the goal?
Click on the arrows to vote for the correct answer
A. B.B.
https://docs.microsoft.com/en-us/dynamics365/fin-ops-core/dev-itpro/sysadmin/security-reportsThe solution presented of generating the User role assignments report can meet the stated goal of investigating which user roles have what visibility and access level to system objects, and then sending a report to the implementation team to address security compliance concerns.
The User role assignments report provides a list of all user roles and their associated security privileges, including access levels to various forms, tables, and other system objects. This report can help identify which roles have access to sensitive information via a form in the system and can provide information about the specific objects that are accessible to each role.
Once the investigation is complete and the report is generated, the implementation team can review the findings and take the necessary steps to address any compliance concerns by adjusting the security privileges of the user roles as needed.
Therefore, the presented solution meets the goal of investigating user roles and their access levels and sending a report to the implementation team to address security compliance concerns. Thus, the answer is A. Yes.