For each user, you can compare the accessed menu items with the permitted entry points. To limit license costs, you can remove permissions for not-accessed entry points.
1. | Click License optimization. |
2. | Click the Security explorer tile. |
3. | On the Action Pane, click View accessed entry points. |
4. | By default, all users, as defined in D365 F&SCM, are shown in the Users list. The users that are not enabled, are highlighted. You can choose to only show enabled users in the Users list. |
  | Select the Show enabled users only check box. |
5. | For each user, you can compare the accessed entry points with the permitted entry points. |
  | In the Users list, find and select the desired user, and compare the permitted entry points with the accessed entry points. |
6. | Close the page. |
7. | Close the page. |
To compare user accessed entry points with the permitted entry points, in the Security and compliance studio parameters, on the Logs tab, set the Enable continuous user logging field to Yes. As a result, each time a user accesses an entry point, this is logged in the User continuous log. The data as shown on the View accessed entry points page is based on the User continuous log.
Related to | Notes |
---|---|
Monitor accessed entry points |
  |