Loading
Salesforce now sends email only from verified domains. Read More
Set Up and Maintain Your Salesforce Organization
Table of Contents
Select Filters

          No results
          No results
          Here are some search tips

          Check the spelling of your keywords.
          Use more general search terms.
          Select fewer filters to broaden your search.

          Search all of Salesforce Help
          Quick Start for Salesforce Shield

          Quick Start for Salesforce Shield

          Set up Shield features and start using them right away. This learning map guides you through how to scan your org for sensitive data, encrypting search indexes with just a few clicks, setting up access to event logs, and creating a prebuilt transaction security policy. You can also see how others are using Shield as part of their broader Salesforce implementation strategy and learn more about Shield features.

          Play icon in a circle

          Get Inspired

          Own’s Data Resilience Tools, Now Part of Salesforce

          Customer Success Story: RBC Wealth Management Wows New Clients with Onboarding in 24 Minutes.

          Customer Success Story: How Humana uses data to bring patients back to the doctor.

          Customer Success Story: How Year Up raised staff efficiency 45% and saved 4,500 hours annually.

          Magnifying glass in a circle

          Find and Classify Sensitive Data

          Data Detect Considerations

          Manage User Access to Data Detect

          Create a Data Detect Policy and Run a Scan

          Data Detect Sensitive Data Categories

          Use Custom Patterns in Data Detect Scan Policies

          Compass in a circle

          Encrypt Your First Set of Data

          Review What You Can Encrypt

          Own from Salesforce: Use Platform Encryption Analyzer to Prepare Sensitive Data for Encryption

          Choose Permissions for Encryption Tasks

          Encrypt Search Index Files with a Root Key

          Bar graph in a circle

          Set Up Access to Event Logs

          Assign Permissions to Access to Event Monitoring

          Turn on Storage and Streaming for Real-Time Events

          Access Event Log Files with the Event Log Browser

          Access and Query Log Data with Event Log Objects

          Wrench in a circle

          Make a Transaction Security Policy

          Review Types of Transaction Security Policies

          Review Transaction Security Policy Actions and Notifications

          See Transaction Security Policy Examples

          Build a Transaction Security Policy

          Open book in a circle

          Learn More About Shield

          Trailhead: Secure Your Apps with Salesforce Shield

          Trailhead: Data Detect: Quick Look

          Trailhead: Platform Encryption for Data Cloud: Quick Look

          Salesforce Datasheet: Gain Visibility and Insights into Your Data with Event Monitoring

          Salesforce Datasheet: Track Changes to Sensitive Data with Field Audit Trail

          Shield Platform Encryption Architecture Guide

           
          Loading
          Salesforce Help | Article