DRAG DROP (Drag and Drop is not supported)
A company audits the security of its Dynamics 365 Supply Chain Management environment.
The security administrator must identify the following details:
-The security roles that have access to the budget plan form.
-The duties that grant access to the form.
You need to recommend auditing tools to meet the requirements.
Which tools should you recommend? To answer, drag the appropriate tools to the correct requirements. Each tool may be used once, more than once, or not at all. You may need to drag the split bar between panes or scroll to view content.
NOTE: Each correct selection is worth one point.

- See Explanation section for answer.
Answer(s): A
Explanation:

Box 1: Segregation of duties rules form
The security roles that have access to the budget plan form.
Set up segregation of duties
You can set up rules to separate tasks that must be performed by different users. This concept is named segregation of duties. For example, you might not want the same person to acknowledge the receipt of goods and to process payment to the vendor. Segregation of duties helps you reduce the risk of fraud, and it also helps you detect errors or irregularities. You can also use segregation of duties to enforce internal control policies.
Box 2: Security diagnostics tool
The duties that grant access to the form.
Security Diagnostics for Dynamics 365 Finance & Operations
When you want to analyze user security rights or permissions, you can use the security diagnostics tool with task recordings in Dynamics 365 Finance & Operations.
This tool is useful when you need to review user security, analyze why a user does not have the desired access, or tailor security to a specific organization.
Incorrect:
* Form information form
* Security duty assignments report
The Security duty assignments report provides a view of all the duties contained within a role.
Reference:
https://learn.microsoft.com/en-us/dynamics365/fin-ops-core/dev-itpro/sysadmin/tasks/set-up-segregation-duties
https://www.encorebusiness.com/blog/security-diagnostics-task-recorder-d365fo/
Reveal Solution Next Question