To optimize licenses, you can monitor the accessed entry points for each user. For each user, you can compare the accessed menu items with the permitted entry points. To limit license costs, you can remove permissions for not-accessed entry points.


Security administrator Security administrator The security administrator (SysSecSecurityAdministrator) maintains user and security setup in D365 F&SCM, grants the ability to create and maintain security roles, duties, and privileges and the ability to assign users to roles, define role assignment rules, and maintain data security policies. Start Start Monitor user accessed entry points Monitor user accessed entry points For each user, you can compare the accessed menu items with the permitted entry points. To limit license costs, you can remove permissions for not-accessed entry points. Procedure 1. Click License optimization. 2. Click the Security explorer tile. 3. On the Action Pane, click View accessed entry points. 4. Select the Show enabled users only check box. 5. In the Users list, find and select the desired user, and compare the permitted entry points with the accessed entry points. 6. Close the page. 7. Close the page. Notes To compare user accessed entry points with the permitted entry points, in the Security and compliance studio parameters, on the Logs tab, set the Enable continuous user logging field to Yes. As a result, each time a user accesses an entry point, this is logged in the User continuous log. The data as shown on the View accessed entry points page is based on the User continuous log. Clean up logged user  accessed entry points? Clean up logged user  accessed entry points? Clean up user accessed entry points log Clean up user accessed entry points log If continuous user logging is enabled, each time a user accesses an entry point, this is logged in the User continuous log. You can clean up the User continuous log manually or in a recurring mode. Procedure 1. Go to Security and compliance > Inquiries > User continuous log. 2. Click Clean up logs for entry points accessed. 3. In the Retention days field, enter a number. 4. Sub-task: Set up batch processing. 5. Expand the Run in the background section. 6. Select Yes in the Batch processing field and fill in the fields as desired. 7. Click Recurrence and fill in the fields as desired. 8. Click OK. 9. Click OK. Notes The data as shown on the View accessed entry points page is based on the User continuous log. So, cleaning up the user continuous log, also effects the data shown on the View accessed entry pints page. End End Yes No

Activities

Name Responsible Description

Monitor user accessed entry points

Security administrator

For each user, you can compare the accessed menu items with the permitted entry points. To limit license costs, you can remove permissions for not-accessed entry points.

Clean up user accessed entry points log

Security administrator

If continuous user logging is enabled, each time a user accesses an entry point, this is logged in the User continuous log.

You can clean up the User continuous log manually or in a recurring mode.

Provide feedback