What is lognostics?
lognostics was created for Salesforce Admins, by Salesforce Admins. For many organizations, their CRM system is a critical platform for daily business operations. Our analysis engine allows you to track changes, view activity, perform in-depth security reviews, and more.
How does it work?
Register For An Account
The Salesforce Analysis Engine is currently a free tool for all organizations! Click the Register button at the top to secure your license now.
Connect Your Organization
Setup is quick and easy. After registration you will have the option to connect your production organization, or sandbox. All data is pulled via the API.
Start Analyzing Your Data
We do not store your data, but we do let you analyze it! Within seconds after setup you will see changes, security, and health reports in your dashboard.
What can I do with this tool?
The analysis engine is constantly getting upgraded based on your feedback and requests. Below is a list of some of the out-of-the-box reports you receive with the tool.
Review and report on all user changes in the last 24 hours, 30 days, or 6 months.
Be able to visualize changes happening on objects over a rapid period of time.
Get a quick view of all user permissions. Displayed in a data table, searchable by username or object.
Real time dashboard with recent changes, activity, and admin actions in your Salesforce environment.
Interactive Data: Search all system logs by user, object, or specific period of time.
Easily track user login information, failed attempts, catch possible brute force attacks.
360-view of all your connected applications. Track activity, modifications, and more.
Diagnose your organization usage, storage, licensing information, and more.
Why use lognostics?
- No downloads, no installation – SaaS
- Universal and interactive global search
- Run quick searches on permission sets
- View your data, security, and organization health logs live
- Get immediate answers to your ad-hoc questions
- Track administrator and user activity in real time
- Data is aggregated into sets based on sections such as: Users, Apex Classes, Field Changes and many more
- Detect behavior that deviates from normal patterns
- Painless setup- register your account and connect your org
- And oh yeah – it’s free.
Learn a few of the most important user Profile permissions to keep your Salesforce Org safe and secure. Ideal for System Admins and others who manage permissions.
Classic Encryption is a great way to secure sensitive customer data in Salesforce. Use our How-To Guide to easily set up a Custom Encrypted Text Fields in Salesforce Lightning.
I don’t know about you, but Salesforce Releases always leave me energized and excited for what’s to come. There are more features than you can shake a stick at, most of them fun, but some of them serious. Although the fun stuff is pretty cool, let’s talk about the more serious side of Salesforce for a bit. We all know the importance of Security and Privacy in Salesforce. Customers not only demand, but expect that we, as the protectors of their data, take security seriously. Salesforce stays on top of that by continually releasing updates and features throughout the year that we can utilize to protect both our customers, and ourselves. But, it’s also no secret that the large amount of changes that come at us three times a year can be a lot to take in, and overwhelming to execute. However, we’re here to make that easier!
If you want to empower your user reporting needs without worrying about the 4 object limit of standard reporting, leveraging Custom Reporting will help you navigate the data architecture hierarchy with much more flexibility.
Salesforce works hand in hand with their clients and gets their trust by continuously working and monitoring procedures to rightfully abide by the laws and regulations in fully committing to all their compliance needs.
With the Organization-Wide Default, we have locked down access to the different Objects within Salesforce. For example, if we set certain Objects to Private, this means that only the Owners have access to the records within those Objects. In this example wherein the organization-wide defaults are somewhat restrictive than Public Read/Write, there is a way to make records more accessible to users, and the first steps are through the Role Hierarchy.
Data Deduplication is a technique or a process used and created to eliminate duplicate records. This is usually done by organizations to streamline their storage use, as well as minimizing bandwidth use that’ll make opening different objects, records, and fields in their CRM pages faster.