by Mark Buchmann | Nov 7, 2022 | Advanced Cloud Security, EFOQUS Apps
All change is difficult, and the introduction of a new ERP system like Microsoft Dynamics 365 Business Central is no exception. As the backbone of many of your most integral business processes, an ERP is critical to the day-to-day functioning of your organization. It...
by Mark Buchmann | Jun 24, 2022 | Advanced Account Schedules, Advanced Cloud Security, Cloud Replicator, EFOQUS Apps, SharePoint Connector
Microsoft Dynamics 365 Business Central is a powerful asset to any business, small or enterprise-level. However, every business is unique and has unique needs, some of which can’t be met by out-of-the-box Business Central. That’s where Business Central apps come in. A...
by Erik Hougaard | Feb 28, 2022 | Advanced Account Schedules, Advanced Cloud Security, Cloud Replicator, EFOQUS Apps, SharePoint Connector
To explain what an ERP app is and what it does, we’ll first give an overview of ERPs. Traditional enterprise resource planning (ERP) solutions consist of integrated and flexible tools for managing many aspects of a business’s operations from within a single...
by Mark Buchmann | Dec 3, 2020 | Advanced Cloud Security
Establishing and enforcing user permissions in Dynamics 365 Business Central is key to avoiding loss due to employee theft and/or fraud. EFOQUS has been working with New View Strategies to address this growing concern. Here we walk you through why you may be at risk...
by Erik Hougaard | Dec 3, 2019 | Advanced Cloud Security, EFOQUS Apps, Training
When you have defined a Security Feature, you must assign it to your users for it to have any effect. A user can get security features in three different ways: Assigned directly to the user Assigned to a user group Assigned to a permission set The user EH has the...
by Erik Hougaard | Dec 3, 2019 | Advanced Cloud Security, EFOQUS Apps, Training
In ACS all security configuration is bundled in Security Features. Security Features are then assigned to User, User Groups or Permission Sets. Security Features can be prioritized in case you have overlapping features. The highest priority Security Feature wins. A...