You have been asked to secure your organization's salesforce application that is running on Microsoft Azure, and find an effective method for inspecting shadow
IT activities in the organization. After an initial investigation, you find that many users access the salesforce application remotely as well as on-premises. Your goal is to find a way to get more visibility, control over shadow IT-related activities, and identify any data leaks in the salesforce application.
Which three steps should you take to achieve your goal? (Choose three.)
cciesam
2 years, 7 months agocharruco
2 years, 7 months ago