Realdolmen Education


Microsoft Dynamics CRM security to its full potential

This course is currently not scheduled on the open calendar, but can be organized on request.

Request Course


1 day(s)


Key users, system customizers and system administrators of a CRM project


Have a thorough knowlegde of Microsoft Dynamics CRM. Attended the following courses: "The salesmodule to its full potential in Microsoft Dynamics CRM online and On Premise", "The service module to its full potential in Microsoft Dynamics CRM online and On Premise", "Customization and configuration in Microsoft Dynamics CRM online and On Premise"


Learn to work in full detail with the 3 levels of security in CRM: Role based, record based and field security as well as with hierarchic security. Learn to add security roles to forms and dashboards.


Class training with individual guidance and the possibility to ask questions. The student can immediately put the possibilities of the program into practice by means of exercises. Each student disposes of a workstation.


This course gives you a detailed explanation about all the security possibilities of Microsoft Dynamics CRM. We start by setting up business units and show you how to create and manage users and teams and link them to a business unit. We will also check all the consequences of moving business units and people within thos business units as well as the consequences of removing/disabling busisness units. Students will also see how to set up a role based security with privileges and access levels and add those roles to users. Afterwards we jump into to the record based security in which you will learn to share records manually and with the help of so-called access teams. We will also explain how to use field security and field security profiles. During the course we will also tell you how to add security roles to forms, dashboards and processess and we will also discuss the hierarchic security, which is a new feature introduced in the 2015 version of Microsoft Dynamics CRM.


  • Role based security
    • Business units
    • Security roles
      • Privileges
      • Access levels
    • Create and manage users and teams
    • Hierarchic security
    • Add security roles to users and teams
  • Record based security
    • Share records with other users
    • Use access teams to share records with other users
  • Field based security
  • Security roles for forms, dashboards and processes