Starting November 20, 2025, Salesforce has been taking enhanced measures to protect against suspicious activity via anonymizing VPNs, proxies, or high-risk IP addresses; credential harvesting; and token theft. Beginning on April 24, 2026, Salesforce expanded these protective measures to include all Connected App and API traffic originating from anonymizing VPNs, proxies, and other high-risk IP addresses.
After April 24, 2026, user accounts that are connecting from anonymizing VPNs, proxies, or other high-risk IP addresses — through Connected App or API usage — will be frozen and have their access blocked.
After April 24, 2026, when a Salesforce user account is detected as connecting from anonymizing VPNs, proxies, or high-risk IP addresses — through Connected App or API usage — the following actions will be taken immediately:
The affected user account will be frozen.
All OAuth refresh tokens granted to the user will be revoked.
An email will be delivered to org admins from Salesforce Security (See Administrator Notifications below).
The affected user will need to contact their org admin to restore access to their account.
Note: Users must ensure they are no longer connecting from an anonymizing VPN, proxies, or high-risk IP address before reauthorizing. Continued use of these services will result in repeated containment.
In the circumstances outlined above, an email titled "Salesforce Security notification” will be delivered to 1) the affected user and 2) all admins and users associated with the impacted instance that have Modify All Data (MAD) permissions. The notifications include the following information:
The affected user ID
Confirmation that automated security containment was applied
Instructions for reviewing the affected account for suspicious activity
Instructions for restoring access if the activity reflects typical usage for the affected user
If automated containment affects a user in your org, follow the steps outlined below:
Determine whether the detected activity reflects typical usage for this user by reviewing session information in Setup:
From Setup, enter Session Management in the Quick Find box.
Review session origin, authentication method, and connected app details.
When reviewing session information, look for signs of suspicious activity, such as IP addresses from unfamiliar geographic locations, unexpected connected apps, or API calls occurring outside the user's typical work hours. For guidance on how to assess Salesforce logs, see the Salesforce Log Analysis Guide in Salesforce Help.
If the activity reflects typical usage for this user, an admin can take the following steps to restore an affected user account:
Unfreeze the affected user account and notify the user to reauthenticate and reset their passwords. For step-by-step instructions, see Freeze or Unfreeze User Accounts.
Notify the users to reauthorize connected apps to regain UI or API access as containment revokes OAuth refresh tokens.
Note: Users must ensure they are no longer connecting from an anonymizing VPN, proxy, or high-risk IP address before reauthorizing. Continued use of these services will result in repeated containment.
For more information about user session information, see View User Session Information on the Session Management Page.
|
Note: Containment actions apply as soon as misuse is detected. Users may lose access before an admin reviews the notification email. |
005318944

We use three kinds of cookies on our websites: required, functional, and advertising. You can choose whether functional and advertising cookies apply. Click on the different cookie categories to find out more about each category and to change the default settings.
Privacy Statement
Required cookies are necessary for basic website functionality. Some examples include: session cookies needed to transmit the website, authentication cookies, and security cookies.
Functional cookies enhance functions, performance, and services on the website. Some examples include: cookies used to analyze site traffic, cookies used for market research, and cookies used to display advertising that is not directed to a particular individual.
Advertising cookies track activity across websites in order to understand a viewer’s interests, and direct them specific marketing. Some examples include: cookies used for remarketing, or interest-based advertising.