¿Cómo utilizar Flow de manera avanzada para optimizar procesos comerciales claves?
-------> https://lttr.ai/Aq2S2
¿Cómo utilizar Flow de manera avanzada para optimizar procesos comerciales claves?
-------> https://lttr.ai/Aq2S2
How Salesforce Will Secure Your Org Against Hackers
Security and convenience are almost always inversely correlated. Making something more secure inherently makes it harder to access, which creates real friction for everyday users. This tension is nothing new. Hackers have always sought unauthorized access to systems, but historically, the barriers were high: computers were expensive and internet access was scarce. This is no longer true.
This battle front has always favored attackers. Security teams must successfully defend against every single intrusion attempt, while hackers only need to succeed once. A single breach can cause significant damage.
What’s changed is the scale and speed of attacks. AI has dramatically lowered the barrier to entry, enabling hackers to probe far more systems, far more frequently than ever before.
Recently, several Salesforce customers experienced significant system breaches involving their Salesforce instances, most notably those tied to the ShinyHunters cybercriminal group. What made these incidents particularly damaging was that the compromised accounts belonged to users with elevated access, including admins and developers. Salesforce denied responsibility and took limited action, largely confining its response to informing and educating the ecosystem about the risks of phishing and vishing attacks.
It seems like that is about to change. Big time.
Salesforce decided to enforce multiple security controls starting June-August 2026 to prevent credential theft, data exfiltration, and account takeovers. IP range restrictions originally planned are no longer being mandated, but MFA for all employee users, phishing-resistant MFA for admins, auto-containment for high-risk connections, and step-up authentication for reports will be enforced.
This means your life is about to get more difficult, especially if you have elevated access typically used by admins, developers and architects.
The New Security Direction by Salesforce
Security Controls Being Enforced
Auto-Containment Measures
High-risk IP blocking was expanded April 24th to include all connected app and API traffic from anonymizing VPNs, proxies, and high-risk IP addresses; users are contained automatically with admin notifications. Extended login anomaly containment applies to all internal user login behavior (excluding external/community users) and focuses on detecting suspicious login patterns. There is no allow-list override, meaning even allow-listed IP addresses will be contained if classified as high-risk at connection time. There are also AWS integration issues under active investigation, with some AWS IP addresses being incorrectly flagged and the issue currently being resolved.
MFA Requirements
All Employee Users:
MFA is required for all employee license users, excluding Experience Cloud and external users. Enforcement is handled via locked settings, so admins cannot disable it. API-only logins are exempt, as the requirement applies exclusively to UI logins. For SSO, providers must pass AMR/ACR signals indicating strong or phishing-resistant MFA.
Timeline: Sandboxes June 22-29; Production July 20-August 17
Admins and Privileged Users:
Phishing-resistant MFA is required for users with elevated privileges, specifically those on the default Sys Admin profile or holding Modify All Data, View All Data, Customize Application, or Author Apex permissions. This standard is stricter than standard MFA, and mobile authenticator apps do not meet the threshold. Only security keys and built-in authenticators or passkeys qualify.
Timeline: Sandboxes June 22-29; Production July 1-27
Email Domain Verification
DKIM or authorized email domain verification is required for all email sending domains (this was previously announced). Enforcement is being rolled out on a staggered timeline; check the timeline knowledge article for the latest dates. A tool is also available to verify compliance status.
Step-Up Authentication for Reports
Time-Based Session Policy:
Anomalous Behavior Detection:
Transaction Security Policy Enhancements (Shield/Event Monitoring customers only):
Additional Considerations
Mobile SDK Lockout Risk for Admins: Warning for admins using the Salesforce Mobile App or custom Mobile SDK apps. Mobile SDK version 13.2.0 and earlier does not support phishing-resistant MFA. Admins using these older versions will be blocked from logging in unless their org pre-configures advanced authentication in My Domain, or until they utilize the new “Login for Admins” browser-based flow arriving in Mobile SDK 13.2.1
Impact on “Waive MFA” Permission: Please note the exact behavior of the “Waive Multi-Factor Authentication for Exempt Users” permission. After enforcement, this permission will no longer automatically waive the MFA requirement; users with this permission will actually be prompted to enroll in MFA in the UI. To restore this exemption for valid testing/automation tools, admins must proactively contact Salesforce Support for approval.
Passwordless Login Recommendation: Please note the best-practice recommendation of enabling “Allow passwordless login with passkeys”. This allows users (especially privileged admins) to meet the strict phishing-resistant MFA requirement by simply logging in with their username and a biometric passkey or security key, bypassing the need for a password and streamlining their experience.
Trial Org Grace Period: Note that Trial Orgs converted to a paid subscription will no longer receive a 30-day grace period to comply with the MFA requirement.
MFA Edge Cases and Exceptions
Experience Cloud and Community users are completely exempt from this specific MFA login mandate. API-only users with the API-only permission assigned are exempt from MFA, as the requirement applies exclusively to UI logins. For Windows SSO, check the AMR field in login history for OIDC, or use the SAML Validator tool for SAML; ignore the strong/weak classification and only verify that the signal is present. Free scratch orgs are not in scope, as MFA enforcement applies only to paid sandbox orgs. When it comes to device activation, MFA takes precedence, and completing MFA exempts users from device activation prompts. Finally, custom IDPs must follow SAML/OIDC industry standards for passing AMR/ACR signals; contact your account team or support for provider-specific nuances.
Customer Communication Plan
Knowledge articles were published, you will find the links in this post. System administrators and security contacts received email notifications on the 6th of May, 2026. Product managers will be hosting webinars on Wednesday, May 13th, with both early and late US time slots available.
Action Items
Don’t Wait for Enforcement to Find Your Gaps
Salesforce’s upcoming security enforcement represents a meaningful shift in how the platform approaches user protection. For years, the responsibility fell almost entirely on customers to configure and maintain their own security posture. That’s changing. Whether you’re an admin, developer, architect, or partner, the June through August enforcement windows are closer than they appear. Audit your orgs, test your configurations in sandbox, and make sure your users are set up with the right verification methods before enforcement kicks in. The friction is real, but so is the risk it’s designed to address. See the official Salesforce documentation here.
Explore related content:
Setup with Agentforce: What Salesforce Admins Need to Know
The Salesforce DKIM Sandbox Problem, and How to Fix It
Clean Data, Smart Flows: Automating Data Cleanup in Salesforce Nonprofit Cloud
#DomainVerification #MFA #Salesforce #SalesforceTutorial #Secutiry #TutorialOAuth Grants Expose Hidden Attack Vector in Enterprise Workspaces
Unmanaged OAuth grants are a ticking time bomb in enterprise workspaces, with 80% of security leaders recognizing them as a critical or significant risk. A recent attack by threat actor UNC6395 exploited valid OAuth refresh tokens to breach Salesforce environments of over 700 organizations, highlighting the devastating…
#OauthSecurityRisk #UnmanagedOauthGrants #RefreshTokenAttacks #Unc6395 #Salesforce
gotta love when #heroku changes their CLI on-the-fly and without warnings
a few couple of hours ago I was able to filter the logs by using `--process-type=router`, the next time the option is gone. Why?
it looks like #Salesforce really hate us.
Incluso en una prueba previa a la masterclass el agente me decía sabes que no estoy capacitado para crear casos
-------> https://lttr.ai/AqsMZ
Salesforce admins, devs, consultants: stop hunting for field API names.
Salesforce Field Scanner is a one-click browser tool that scrapes every field, label, API name, and value from the current Salesforce page and exports clean JSON. Use it for reports, automation, API work, or piping data into an LLM.
Try it: https://apaops-storefront.pages.dev/products/salesforce-field-scanner-640498/
Salesforce's recent update and the PR problem it caused
https://www.geekwisdom.org/2026/04/30/salesforce-and-your-customer-data/
https://winbuzzer.com/2026/04/30/20260430-microsoft-blames-slacks-lackluster-growth-on-infer-xcxwbn/
UK Court Weighs Microsoft Teams Bundling Against Slack
#MicrosoftTeams #Microsoft #Slack #Salesforce #Antitrust #Lawsuits #EnterpriseSoftware #Microsoft365 #EuropeanCommissionEC #EuropeanUnionEU #UnitedKingdomUK #Licensing #Court