Bearbeiten

Freigeben über


Security tips for business users

This article describes how you can work with users and configure their devices to improve security.

Important

Use this article together with industry standard security practices for securing users and their access to company data.

Enforce separation of duties for sensitive operations

In Business Central, use built-in features like Approval Workflows to ensure critical transactions (like large payments, purchase orders, or journal postings) require approval by a second person. This practice reduces the risk of fraud or mistakes by a single user.

Establish out-of-band verification for high-value transactions

For example, some organizations use a pre-agreed 'safety word' or callback procedure to confirm any unusual payment requests. Training employees to verify before acting can prevent scams.

Kiosks and shared devices

Customers using kiosks, where multiple users sign in to Business Central with their own identity from a single terminal, should apply extra security practices for an appropriate level of isolation between users:

  • Before ending a session at the kiosk, business users should remember to sign out of Business Central, then close all browser windows. Closing the Business Central browser tab or closing the browser without signing out might not fully complete the sign-out process.
  • Each user should use private or guest browsing modes so that any data cached by Business Central is discarded when the browser closes. Private or guest browsing can degrade some Business Central features and performance optimizations that are only available when the browser provides access to its storage mechanisms.

Security and Protection
Application Security
Online Security
On-Premises Security