Configuring the FSM Module Securely

The FSM module offers a high degree of customization, letting businesses adapt it to their unique needs. While this flexibility is a strength, it can also inadvertently introduce security risks. This section highlights critical aspects of the FSM configuration, where improper settings could create significant security implications.

Warning:

Only trained employees should be given access to the Field Service Configuration record type. Access to this record type should be highly restricted.

General Notices