Essential Security Settings in the Business Central Admin Center
Securing a Business Central environment is crucial to protecting company data and ensuring only authorised users have access.
This guide outlines two key security settings in the Business Central Admin Center that help enhance system security.
1. Manage Environment Level Access
An important steps in securing a Business Central environment is properly configuring the environment level user access.
To do this:
- Navigate to the Business Central Admin Center.
- Go to Environments and select the target environment.
- Check the Security Group settings.
- Assign a suitable Security Group.
Setting a security groups at the environment level allows administrators to control access efficiently and broadly across Production and Non-Production environments.
2. Understanding the Partner Access Setting
Another crucial security setting is Partner Access. If an external Microsoft partner manages Business Central, they may require access to your environment for support.
To review and configure this:
- Open the Business Central Admin Center.
- Click to open an Environment and check the Partner Access setting.
- You can toggle access on and off - very handy to ensure total exclusion of any third party
- You can also review see and manage all the partners that have been granted GDAP access to your Business Central environments.
- Remove or restrict access if necessary.
I would always recommend limiting partner access to only those who actively support your system as a bare minimum. Even where you only have 1 partner with access, should another be added in future the won't immediately have access to all areas with this feature turned on.
Best Practices for Business Central Security
- Regularly review Security Group membership to ensure only authorised users have access.
- Use Security Groups to simplify access control across environments.
- Monitor partner access to prevent unnecessary external access.
By configuring these two simple security settings in the Business Central Admin Center, businesses can strengthen their ERP environment against potential risks.
Next time I'll look at how to use Security Groups for BC application permissions.
Handy Links
What do you think?
Please let me know your thoughts in the comments
Connect or follow me on LinkedIn to get all my updates Andrew Wingate | LinkedIn
Click to Follow