Security Tips for Business Users
This article describes how you can work with users and configure their devices to improve security.
Important
Use this article together with industry standard security practices for securing users and their access to company data.
Kiosks and shared devices
Customers using kiosks, where multiple users sign in to Business Central with their own identity from a single terminal, should apply additional security practices for an appropriate level of isolation between users:
- Before ending a session at the kiosk, business users should remember to sign out of Business Central, then close all browser windows. Closing the Business Central browser tab or closing the browser without signing out might not fully complete the signout process.
- Each user should use private or guest browsing modes so that any data cached by Business Central is discarded when the browser is closed. Users should be made aware that private or guest browsing can degrade some Business Central features and performance optimizations that are only available when the browser provides access to its storage mechanisms.
See Also
Security and Protection
Application Security
Online Security
On-Premises Security
反馈
https://aka.ms/ContentUserFeedback。
即将发布:在整个 2024 年,我们将逐步淘汰作为内容反馈机制的“GitHub 问题”,并将其取代为新的反馈系统。 有关详细信息,请参阅:提交和查看相关反馈