Note: This question is part of a series of questions that present the same scenario.
Each question in the series contains a unique solution that might meet the stated goals.
Some question sets might have more than one correct solution, while others might not have a correct solution.
After you answer a question in this section, you will NOT be able to return to it.
As a result, these questions will not appear in the review screen.
You are a Dynamics 365 Finance security administrator.
When testing security setups, users report that certain roles are gaining access to sensitive information via a form in the system.
You must investigate which user roles have what visibility and access level to system objects, and then send a report to the implementation team to address security compliance concerns.
You need to report the information from the system.
Solution: Generate the Security role access report.
Does the solution meet the goal?
Click on the arrows to vote for the correct answer
A. B.A.
https://docs.microsoft.com/en-us/dynamics365/fin-ops-core/dev-itpro/sysadmin/security-reportsThe solution presented in the scenario of generating the Security role access report appears to be appropriate to meet the goal of investigating user roles that have access to sensitive information and providing a report to the implementation team for security compliance concerns.
The Security role access report is a standard report available in Dynamics 365 Finance that provides information about the privileges and permissions that are granted to different security roles within the system. The report includes details on access levels to specific forms, tables, and fields within the system, which can be used to identify any potential security breaches.
By generating the Security role access report, the security administrator can analyze the permissions and access levels of the different roles and determine which roles have access to sensitive information via the form in question. The report can then be used to provide recommendations to the implementation team to address any compliance concerns and improve security in the system.
Therefore, the solution of generating the Security role access report appears to meet the stated goal of investigating user roles that have access to sensitive information and providing a report to the implementation team for security compliance concerns. Hence, the answer is "A. Yes".